Search alternatives:
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
peer » per (Expand Search)
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
peer » per (Expand Search)
-
601
Association between central obesity indices and iron status indicators among Qatari adults
Published 2021“…This study aimed to investigate the link between abdominal obesity indices and iron status among adults in Qatar. A random sample of 1000 healthy Qatari adults, aged 20–50 years, was obtained from Qatar Biobank study. …”
Get full text
Get full text
Get full text
-
602
-
603
-
604
Adaptive Network Coding over Cognitive Relay Networks
Published 2013“…Using numerical results, we show that the proposed adaptive network coding achieves up to 5 dB gain at target outage 10^−3 as compared to conventional fixed network coding schemes.…”
Get full text
Get full text
-
605
-
606
-
607
-
608
-
609
-
610
-
611
-
612
-
613
-
614
-
615
Compressive And Tensile Strength Of Concrete Loaded And Soaked In Crude Oil
Published 2000“…Results show that the rate of crude oil absorption is high at early stages of soaking, but this rate decreases with time. There is a reduction in the absorption by 30 to 40 percent of ultimate strength in specimens exposed to instantaneous loading as compared with unloaded specimens. …”
Get full text
-
616
Detailed organic characterization of process water to evaluate reverse osmosis membrane fouling in industrial wastewater treatment
Published 2024“…After ACF treatment, the hydrophobic organics decreased to 0.65 mg/L, revealing that the ACF is removing >50 % of hydrophobic organics which are likely responsible for membrane fouling. …”
Get full text
Get full text
Get full text
article -
617
-
618
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
619
-
620