بدائل البحث:
12 decrease » _ decrease (توسيع البحث)
nn decrease » _ decrease (توسيع البحث)
a decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
10 12 » 10 11 (توسيع البحث)
12 decrease » _ decrease (توسيع البحث)
nn decrease » _ decrease (توسيع البحث)
a decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
10 12 » 10 11 (توسيع البحث)
-
1421
-
1422
-
1423
-
1424
-
1425
-
1426
-
1427
-
1428
Does Securitisation Make Monetary Policy Less Effective?
منشور في 2021"…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. We employ a panel VAR model, and estimate it using a GMM system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
1429
-
1430
-
1431
Recycled Waste Tires Management in Constructions
منشور في 2020"…The LCCA results show that the rubberized concrete (RC2), obtained by replacing 5% of aggregate and mixing it with seawater, is more cost-effective than RC1, with a cost savings of 30%.LCCA data were acquired by investigating thirteen concrete mixes (a control mix; 5%, 10%, and 20% rubber aggregate substitutions mixed with freshwater; and 0%, 5%, and 10% rubber aggregate substitutions mixed with seawater). …"
احصل على النص الكامل
-
1432
Algal-algal bioflocculation enhances the recovery efficiency of Picochlorum sp. QUCCCM130 with low auto-settling capacity
منشور في 2023"…Results showed that self-settlement capacity increased with cell size and can be indirectly related to a decreased zeta potential of larger cells which enhances the Van der Waals attractive forces. …"
احصل على النص الكامل
احصل على النص الكامل
-
1433
-
1434
-
1435
-
1436
-
1437
Deep learning for detection of routing attacks in the internet of things
منشور في 2018"…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …"
احصل على النص الكامل
احصل على النص الكامل
-
1438
-
1439
-
1440