بدائل البحث:
per decrease » _ decrease (توسيع البحث)
10 decrease » _ decrease (توسيع البحث)
a decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
7 10 » _ 10 (توسيع البحث), a 10 (توسيع البحث), 5 10 (توسيع البحث)
per decrease » _ decrease (توسيع البحث)
10 decrease » _ decrease (توسيع البحث)
a decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
7 10 » _ 10 (توسيع البحث), a 10 (توسيع البحث), 5 10 (توسيع البحث)
-
1361
-
1362
-
1363
-
1364
-
1365
-
1366
-
1367
-
1368
-
1369
-
1370
-
1371
Does Securitisation Make Monetary Policy Less Effective?
منشور في 2021"…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. We employ a panel VAR model, and estimate it using a GMM system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
1372
-
1373
-
1374
-
1375
Recycled Waste Tires Management in Constructions
منشور في 2020"…The LCCA results show that the rubberized concrete (RC2), obtained by replacing 5% of aggregate and mixing it with seawater, is more cost-effective than RC1, with a cost savings of 30%.LCCA data were acquired by investigating thirteen concrete mixes (a control mix; 5%, 10%, and 20% rubber aggregate substitutions mixed with freshwater; and 0%, 5%, and 10% rubber aggregate substitutions mixed with seawater). …"
احصل على النص الكامل
-
1376
Algal-algal bioflocculation enhances the recovery efficiency of Picochlorum sp. QUCCCM130 with low auto-settling capacity
منشور في 2023"…Results showed that self-settlement capacity increased with cell size and can be indirectly related to a decreased zeta potential of larger cells which enhances the Van der Waals attractive forces. …"
احصل على النص الكامل
احصل على النص الكامل
-
1377
-
1378
Deep learning for detection of routing attacks in the internet of things
منشور في 2018"…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …"
احصل على النص الكامل
احصل على النص الكامل
-
1379
-
1380