نتایج جستجو برای: third
تعداد نتایج: 246634 فیلتر نتایج به سال:
i ntroduction: our study was designed to assess the effect of the submucosal injection of dexamethasone on postoperative discomfort after surgical removal of impacted mandibular third molars. m at erials and methods : twenty six patients with bilaterally bony impacted mandibular third molars were recruited to this split mouth study. on the study side, prior to surgery, 8 mg of dexamethasone was...
introdouction: impacted mandibular third molar surgery may affect periodontal status of the adjacent second molar. the purpose of this study was to evaluate the changes in periodontal health parameters distal to the adjacent second molar following surgical extraction of an impacted mandibular third molar. materials and methods: we selected 50 subjects with a mean age of 22.8 (ranging from 18 to...
When trying to understand the structure of a social network, the number of mutual dyads is often used to describe tendency toward mutuality (TTM). Only few works, however, deal with measures of TTM and only the work of Rao and Bandyopadhyay [Rao, A.R., Bandyopadhyay, S., 1987. Sankhya 49 Ser. A, pp. 141–188] compares between the different measures. This paper presents the different measures for...
Electronic institutions are software frameworks integrating normative environments where agents interact to create mutual commitments. Contracts are formalizations of business commitments among groups of agents, and comprise a set of applicable norms. An electronic institution acts as a trusted third-party that monitors contract compliance, by integrating in its normative environment the contra...
A mineração temporal de textos (temporal text mining TTM) é uma técnica cujo objetivo é descobrir a estrutura latente e padrões temporais em coleções de texto. Estas características são importantes em coleções em que os tópicos de interesse mudam frequentemente com o passar do tempo. Além disso, a mineração temporal de textos é útil em ferramentas de sumarização e descoberta de tendências. Nest...
A distributed protocol is presented for anonymous and secure voting that is failure-tolerant with respect to malicious behavior of individual participants and that does not rely on a trusted third party. The proposed voting protocol was designed to be executed on a fixed group of N known participants, each of them casting one vote that may be a vote for abstention. Several attack vectors on the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید