Showing 1,101 - 1,120 results of 1,767 for search '(( 10 ((we decrease) OR (((mean decrease) OR (a decrease)))) ) OR ( 2 step decrease ))', query time: 0.18s Refine Results
  1. 1101
  2. 1102
  3. 1103
  4. 1104
  5. 1105

    Influenza prevalence and vaccine efficacy among diabetic patients in Qatar by Swapna, Thomas

    Published 2023
    “…Among DM patients, influenza was the most prevalent respiratory pathogen at 48.9%. Influenza virus A (IVA) was the most circulating type, contributing to 38.4%, followed by IVB contributing to 10.4% of total respiratory infections. …”
    Get full text
    Get full text
    Get full text
  6. 1106

    Influenza prevalence and vaccine efficacy among diabetic patients in Qatar by Swapna, Thomas

    Published 2023
    “…Among DM patients, influenza was the most prevalent respiratory pathogen at 48.9%. Influenza virus A (IVA) was the most circulating type, contributing to 38.4%, followed by IVB contributing to 10.4% of total respiratory infections. …”
    Get full text
    Get full text
    Get full text
    article
  7. 1107

    Optimal virtual network function placement in multi-cloud service function chaining architecture by Bhamare, Deval

    Published 2017
    “…Greedy approach has already been widely studied in the literature for the VM placement problem. Especially we compare our proposed heuristic with a greedy approach using first-fit decreasing (FFD) method. …”
    Get full text
    Get full text
  8. 1108
  9. 1109
  10. 1110
  11. 1111
  12. 1112
  13. 1113
  14. 1114

    Does Securitisation Make Monetary Policy Less Effective? by Qanas, Jalal

    Published 2021
    “…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …”
    Get full text
    Get full text
    Get full text
  15. 1115
  16. 1116
  17. 1117
  18. 1118
  19. 1119

    Deep learning for detection of routing attacks in the internet of things by YAVUZ, Furkan Yusuf

    Published 2018
    “…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
    Get full text
    Get full text
  20. 1120