A Fine Topology on the Entrance Boundary

1969 ◽  
Vol 14 (1) ◽  
pp. 132-135
Author(s):  
V. L. Mazo
Keyword(s):  
1999 ◽  
Vol 59 (3) ◽  
pp. 881-894 ◽  
Author(s):  
Matts R. Essén ◽  
Stephen J. Gardiner
Keyword(s):  

2020 ◽  
pp. 13-28
Author(s):  
admin admin ◽  
◽  
◽  
M. P. Sindhu

The set which describes the uncertainty incident with three levels of attributes is entitled as a neutrosophic set. The unique collection of open sets which contains all types of open sets is termed as fine-open sets. The current study introduces a topology on merging these two sets, called neutro-fine topological space. Additionally, the approach of separation axioms is implemented in such space. Furthermore, the real-life application is examined as a decision-making problem in this space. The problem is to make an unfavorable query into a favorable one by determining the complement and absolute complement of such issued neutro-fine open sets. This problem desires to find a positive solution. The solving stepwise mechanism reveals in the algorithm, also formulae provide to compute the outcome with explanatory examples.


2015 ◽  
Vol 30 (30) ◽  
pp. 1550161 ◽  
Author(s):  
Ignatios Antoniadis ◽  
Spiros Cotsakis

We discuss the topological nature of the boundary spacetime, the conformal infinity of the ambient cosmological metric. Due to the existence of a homothetic group, the bounding spacetime must be equipped not with the usual Euclidean metric topology but with the Zeeman fine topology. This then places severe constraints to the convergence of a sequence of causal curves and the extraction of a limit curve, and also to our ability to formulate conditions for singularity formation.


2018 ◽  
Vol 135 (1) ◽  
pp. 59-83 ◽  
Author(s):  
Anders Björn ◽  
Jana Björn ◽  
Visa Latvala
Keyword(s):  

2016 ◽  
Vol 7 (22) ◽  
pp. 3643-3663 ◽  
Author(s):  
Heng Chen ◽  
Jie Kong

Recent advances in the fine topology regulation of hyperbranched polymers from an A2 + B3 strategy were presented from the perspectives of topology description and architecture control.


1984 ◽  
Vol 18 (1) ◽  
pp. 89-94 ◽  
Author(s):  
David Spring
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document