Search alternatives:
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
-
1141
Control of the antagonistic effects of heat-assisted chlorine oxidative degradation on pressure retarded osmosis thin film composite membrane surface
Published 2021“…The chlorine oxidative degradation is optimized in terms of chlorine exposure (a factor of both exposure time and chemical dosage), solution pH, and the subsequent heating time. …”
Get full text
Get full text
Get full text
-
1142
Foamed phase change materials based on recycled polyethylene/paraffin wax blends
Published 2021“…Differential Scanning Calorimetry was used to determine the specific enthalpies of melting (22.4–25.1 J/g) what is the latent heat of materials utilized during a heat absorption. A stability of samples during 10 heating/cooling cycles was demonstrated. …”
Get full text
Get full text
-
1143
-
1144
-
1145
-
1146
-
1147
-
1148
Optimal virtual network function placement in multi-cloud service function chaining architecture
Published 2017“…Greedy approach has already been widely studied in the literature for the VM placement problem. Especially we compare our proposed heuristic with a greedy approach using first-fit decreasing (FFD) method. …”
Get full text
Get full text
-
1149
-
1150
-
1151
-
1152
-
1153
-
1154
Does Securitisation Make Monetary Policy Less Effective?
Published 2021“…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …”
Get full text
Get full text
Get full text
-
1155
-
1156
-
1157
-
1158
Timetabling hub-and-spoke parcel distribution inter-facility network
Published 2013“…The resolving of the problem highly depends on the ability of the analyst to develop intelligent ways to limit the values of decision variables. The model applied to a real-world case is entered in a spreadsheet where the objective function is evaluated for the possible decision variable values; the timetable generated for a newly designed hub-and-spoke network decreased shipping time by around 30% as compared to the timetable of the existing design.…”
Get full text
-
1159
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
1160