Search alternatives:
10 decrease » _ decrease (Expand Search)
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
25 10 » 5 10 (Expand Search), 20 10 (Expand Search), 25 11 (Expand Search)
10 decrease » _ decrease (Expand Search)
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
25 10 » 5 10 (Expand Search), 20 10 (Expand Search), 25 11 (Expand Search)
-
1161
Optimal virtual network function placement in multi-cloud service function chaining architecture
Published 2017“…Greedy approach has already been widely studied in the literature for the VM placement problem. Especially we compare our proposed heuristic with a greedy approach using first-fit decreasing (FFD) method. …”
Get full text
Get full text
-
1162
-
1163
-
1164
-
1165
-
1166
Prospects of Biocrude Production Potential from Local Diatom
Published 2020“…Next, Nitzchia reversa was harvested using a 25 m2 crossflow filtration membrane module. Crossflow harvested biomass slurry was centrifuged at 5000 RPM for 10 minutes to obtain a wet biomass paste containing 25 - 30% solid content. …”
Get full text
-
1167
The investigation of treatment design parameters on carbon integration networks
Published 2023“…Additionally, the optimal diameter of the treatment column was more responsive to changes in solvent temperature for cases with low net capture targets (below 10%), while its sensitivity decreased for higher capture targets (above 10%). …”
Get full text
Get full text
Get full text
-
1168
-
1169
-
1170
-
1171
Does Securitisation Make Monetary Policy Less Effective?
Published 2021“…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …”
Get full text
Get full text
Get full text
-
1172
-
1173
-
1174
-
1175
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
1176
-
1177
-
1178
-
1179
-
1180