بدائل البحث:
we decrease » _ decrease (توسيع البحث)
a decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
3 points » _ point (توسيع البحث), a point (توسيع البحث), 3d point (توسيع البحث)
we decrease » _ decrease (توسيع البحث)
a decrease » _ decrease (توسيع البحث), _ decreased (توسيع البحث), _ decreases (توسيع البحث)
3 points » _ point (توسيع البحث), a point (توسيع البحث), 3d point (توسيع البحث)
-
1101
Influenza prevalence and vaccine efficacy among diabetic patients in Qatar
منشور في 2023"…Among DM patients, influenza was the most prevalent respiratory pathogen at 48.9%. Influenza virus A (IVA) was the most circulating type, contributing to 38.4%, followed by IVB contributing to 10.4% of total respiratory infections. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
1102
Influenza prevalence and vaccine efficacy among diabetic patients in Qatar
منشور في 2023"…Among DM patients, influenza was the most prevalent respiratory pathogen at 48.9%. Influenza virus A (IVA) was the most circulating type, contributing to 38.4%, followed by IVB contributing to 10.4% of total respiratory infections. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
1103
Optimal virtual network function placement in multi-cloud service function chaining architecture
منشور في 2017"…Greedy approach has already been widely studied in the literature for the VM placement problem. Especially we compare our proposed heuristic with a greedy approach using first-fit decreasing (FFD) method. …"
احصل على النص الكامل
احصل على النص الكامل
-
1104
-
1105
-
1106
-
1107
-
1108
-
1109
-
1110
Does Securitisation Make Monetary Policy Less Effective?
منشور في 2021"…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
1111
-
1112
-
1113
-
1114
-
1115
Deep learning for detection of routing attacks in the internet of things
منشور في 2018"…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …"
احصل على النص الكامل
احصل على النص الكامل
-
1116
-
1117
-
1118
-
1119
-
1120