Showing 1,161 - 1,180 results of 1,773 for search '(( 9 10 decrease ) OR ( 10 ((we decrease) OR (((mean decrease) OR (a decrease)))) ))*', query time: 0.18s Refine Results
  1. 1161
  2. 1162

    Foamed phase change materials based on recycled polyethylene/paraffin wax blends by Sobolčiak, Patrik

    Published 2021
    “…Differential Scanning Calorimetry was used to determine the specific enthalpies of melting (22.4–25.1 J/g) what is the latent heat of materials utilized during a heat absorption. A stability of samples during 10 heating/cooling cycles was demonstrated. …”
    Get full text
    Get full text
  3. 1163
  4. 1164
  5. 1165
  6. 1166

    Optimal virtual network function placement in multi-cloud service function chaining architecture by Bhamare, Deval

    Published 2017
    “…Greedy approach has already been widely studied in the literature for the VM placement problem. Especially we compare our proposed heuristic with a greedy approach using first-fit decreasing (FFD) method. …”
    Get full text
    Get full text
  7. 1167
  8. 1168
  9. 1169

    The Effect of Experimental Recuperative and Appetitive Post-lunch Nap Opportunities, With or Without Caffeine, on Mood and Reaction Time in Highly Trained Athletes by Romdhani, Mohamed

    Published 2021
    “…N20 decreased 2CRT after PSD (pre: 411 ± 13 ms vs. post: 366 ± 20 ms; p < 0.001; d = 2.89; Δ% = 10.81) and NSN (pre: 418 ± 29 ms vs. post: 375 ± 40 ms; p < 0.001; d = 1.23; Δ% = 10.23). …”
    Get full text
    Get full text
    Get full text
  10. 1170
  11. 1171
  12. 1172
  13. 1173
  14. 1174

    Does Securitisation Make Monetary Policy Less Effective? by Qanas, Jalal

    Published 2021
    “…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …”
    Get full text
    Get full text
    Get full text
  15. 1175
  16. 1176
  17. 1177
  18. 1178

    Deep learning for detection of routing attacks in the internet of things by YAVUZ, Furkan Yusuf

    Published 2018
    “…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
    Get full text
    Get full text
  19. 1179
  20. 1180