نتایج جستجو برای: like subset
تعداد نتایج: 744573 فیلتر نتایج به سال:
In the transformation semigroup (X, S) we introduce the height of a closed nonempty invariant subset of X, define the transformed dimension of nonempty subset S of X and obtain some results and relations.
تکانه های قیمت نفت که از تحولات برون زا سرچشمه می گیرند بزرگترین منبع اختلال در اقتصاد ایران محسوب می شوند.یکی از بخشهای اقتصاد که می تواند تحت تاثیر این تکانه ها قرار گیرد بازار سهام است. از طرفی تکانه های قیمتی نفت یکی از عوامل ایجاد تورم در کشور هستند، بنابراین درک نحوه تأثیر تکانه سیاست پولی ناشی از تکانه های قیمتی نفت بر حوزه وسیعتری از اقتصاد، ضرورتاً مستلزم آگاهی از اثر این اقدامات سیاستی...
Given the integers 1,, k,,1 2 , k 2 , r, which satisfy the condition 1,, 1 2 > r> k,, k 2 > 0, we define m = N(1,, k, ; 1 2 , k 2 ; r) as the smallest integer with the following property : if S is a set containing m points and the r-subsets of S are partitioned arbitrarily into two classes, then for i = 1 or 2 there exists an l i subset of S each of whose ki-subsets lies in some r-subset of the...
A genome-wide screen for large structural variants showed that a copy number variant (CNV) in the region encoding killer cell immunoglobulin-like receptors (KIR) associates with HIV-1 control as measured by plasma viral load at set point in individuals of European ancestry. This CNV encompasses the KIR3DL1-KIR3DS1 locus, encoding receptors that interact with specific HLA-Bw4 molecules to regula...
Let G be a group. A subset X of G is a set of pairwise noncommuting elements if xy ̸= yx for any two distinct elements x and y in X. If |X| ≥ |Y | for any other set of pairwise non-commuting elements Y in G, then X is said to be a maximal subset of pairwise non-commuting elements. In this paper we determine the cardinality of a maximal subset of pairwise non-commuting elements in any non-abelian...
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
To evaluate the fully automated FACSCanto software, we compared lymphocyte subpopulation counts obtained using three-color FACSCalibur-CELLQuest and six-color FACSCanto-FACSCanto software techniques. High correlations were observed between data obtained with these techniques. Our study indicated that FACSCanto clinical software is accurate and sensitive in single-platform lymphocyte immunopheno...
Let m + n particles be thrown randomly, independently of each other into N cells, using the following two-stage procedure. 1. The first m particles are allocated equiprobably, that is, the probability of a particle falling into any particular cell is 1/N . Let the ith cell contain mi particles on completion. Then associate with this cell the probability ai = mi/m and withdraw the particles. 2. ...
Let Fq be the finite field of q elements. Let H ⊆ Fq be a multiplicative subgroup. For a positive integer k and element b ∈ Fq, we give a sharp estimate for the number of k-element subsets of H which sum to b.
In this paper, we obtain an explicit formula for the number of zero-sum k-element subsets in any finite abelian group.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید