بدائل البحث:
we decrease » _ decrease (توسيع البحث)
1 decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
a decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
19 1 » 19 _ (توسيع البحث), 19 a (توسيع البحث)
we decrease » _ decrease (توسيع البحث)
1 decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
a decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
19 1 » 19 _ (توسيع البحث), 19 a (توسيع البحث)
-
1181
-
1182
-
1183
High temperature thermal stability of innovative nanostructured thin coatings for advanced tooling
منشور في 2014"…The main problem with steel, isthat itexhibits a relatively low hardness (below 10 GPa) which strongly decreases upon annealing above about 600 K.Thus, the majority of modern tools are nowadays coated with hard coatings that increase the hardness, decrease the coefficient of friction and protect the tools against oxidation. …"
احصل على النص الكامل
احصل على النص الكامل
-
1184
-
1185
-
1186
-
1187
Optimal virtual network function placement in multi-cloud service function chaining architecture
منشور في 2017"…Greedy approach has already been widely studied in the literature for the VM placement problem. Especially we compare our proposed heuristic with a greedy approach using first-fit decreasing (FFD) method. …"
احصل على النص الكامل
احصل على النص الكامل
-
1188
-
1189
-
1190
-
1191
-
1192
-
1193
Does Securitisation Make Monetary Policy Less Effective?
منشور في 2021"…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
1194
-
1195
-
1196
-
1197
Deep learning for detection of routing attacks in the internet of things
منشور في 2018"…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …"
احصل على النص الكامل
احصل على النص الكامل
-
1198
-
1199
-
1200