Search alternatives:
nn decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
nn decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
-
1321
Does Securitisation Make Monetary Policy Less Effective?
Published 2021“…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. We employ a panel VAR model, and estimate it using a GMM system. …”
Get full text
Get full text
Get full text
-
1322
Effect of pH on dissolution of iron sulfide scales using THPS
Published 2019“…Both experimental and theoretical techniques suggest that the pyrite dissolution ability of THPS decreases as pH increases. Conversely, combing THPS with EDTA (Ethylenediaminetetraacetic acid) proved effective in dissolving a mixture of different iron sulfide field scales. …”
Get full text
Get full text
-
1323
-
1324
-
1325
Correlated decay of triplet excitations in the shastry-sutherland compound SrCu2 (BO3)2
Published 2014“…The excitation amplitude rapidly decreases as a function of temperature, while the integrated spectral weight can be explained by an isolated dimer model up to 10 K. …”
Get full text
Get full text
-
1326
-
1327
-
1328
-
1329
-
1330
-
1331
Recycled Waste Tires Management in Constructions
Published 2020“…The LCCA results show that the rubberized concrete (RC2), obtained by replacing 5% of aggregate and mixing it with seawater, is more cost-effective than RC1, with a cost savings of 30%.LCCA data were acquired by investigating thirteen concrete mixes (a control mix; 5%, 10%, and 20% rubber aggregate substitutions mixed with freshwater; and 0%, 5%, and 10% rubber aggregate substitutions mixed with seawater). …”
Get full text
-
1332
-
1333
-
1334
-
1335
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
1336
-
1337
-
1338
-
1339
-
1340