Search alternatives:
we decrease » _ decrease (Expand Search)
nn decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
we decrease » _ decrease (Expand Search)
nn decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
-
981
-
982
-
983
-
984
-
985
-
986
-
987
Effect of concentration of DOC loaded TiO 2 nanotubes on the corrosion behavior of smart coatings
Published 2019“…Towards this direction, TiO2 nanotubes with an average size of ⁓10–15 nm (as confirmed by scanning electron microscope (SEM) and transmission electron microscope (TEM) analysis) were synthesized through a hydrothermal process and were then impregnated with DOC. …”
Get full text
Get full text
-
988
-
989
-
990
-
991
-
992
-
993
-
994
The mechanical and adhesive properties of electrically and thermally conductive polymeric composites based on high density polyethylene filled with nickel powder
Published 2013“…The stress at break of the composites behaved nonlinearly; the low filler content suppressed necking, resulting in a decrease in stress at break, whereas higher filler content (higher than 10vol.%) led to reinforcement of the composites and therefore increased the stress at break.The presence of nickel particles throughout the HDPE matrix increased the hydrophilicity of the composites. …”
Get full text
Get full text
Get full text
-
995
-
996
-
997
Optimal virtual network function placement in multi-cloud service function chaining architecture
Published 2017“…We observe that with a little compromise (gap of less than 10% of the optimal) in the solution quality (total delays and cost), affinity-based heuristic can solve the larger problem more quickly than ILP.…”
Get full text
Get full text
-
998
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
999
Bond durability of sand coated and ribbed basalt FRP bars embedded in high-strength concrete
Published 2023“…However, specimens with high-strength concrete achieved most of or above their maximum bond strength after the descending stage, while those with normal-strength concrete showed a decrease in bond strength to an approximately constant value with continuous slip. …”
Get full text
Get full text
-
1000
Production and investigation of flexible nanofibers of sPEEK/PVP loaded with RuO2 nanoparticles
Published 2021“…The samples were synthesized with different concentrations of hydrous ruthenium chloride of 2 wt%, 5 wt%, and 10 wt%, and then annealed at a temperature of 300 �C for 4 h to form the ruthenium oxide nanoparticles. …”
Get full text
Get full text