Search alternatives:
10 decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
7 10 » _ 10 (Expand Search), a 10 (Expand Search), 5 10 (Expand Search)
10 decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
7 10 » _ 10 (Expand Search), a 10 (Expand Search), 5 10 (Expand Search)
-
1361
-
1362
-
1363
-
1364
-
1365
-
1366
Does Securitisation Make Monetary Policy Less Effective?
Published 2021“…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. We employ a panel VAR model, and estimate it using a GMM system. …”
Get full text
Get full text
Get full text
-
1367
-
1368
-
1369
-
1370
Recycled Waste Tires Management in Constructions
Published 2020“…The LCCA results show that the rubberized concrete (RC2), obtained by replacing 5% of aggregate and mixing it with seawater, is more cost-effective than RC1, with a cost savings of 30%.LCCA data were acquired by investigating thirteen concrete mixes (a control mix; 5%, 10%, and 20% rubber aggregate substitutions mixed with freshwater; and 0%, 5%, and 10% rubber aggregate substitutions mixed with seawater). …”
Get full text
-
1371
Algal-algal bioflocculation enhances the recovery efficiency of Picochlorum sp. QUCCCM130 with low auto-settling capacity
Published 2023“…Results showed that self-settlement capacity increased with cell size and can be indirectly related to a decreased zeta potential of larger cells which enhances the Van der Waals attractive forces. …”
Get full text
Get full text
-
1372
-
1373
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
1374
-
1375
-
1376
-
1377
-
1378
-
1379
-
1380