Search alternatives:
10 decrease » _ decrease (Expand Search)
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
9 10 » _ 10 (Expand Search), a 10 (Expand Search), 9 11 (Expand Search)
10 decrease » _ decrease (Expand Search)
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
9 10 » _ 10 (Expand Search), a 10 (Expand Search), 9 11 (Expand Search)
-
1161
-
1162
Foamed phase change materials based on recycled polyethylene/paraffin wax blends
Published 2021“…Differential Scanning Calorimetry was used to determine the specific enthalpies of melting (22.4–25.1 J/g) what is the latent heat of materials utilized during a heat absorption. A stability of samples during 10 heating/cooling cycles was demonstrated. …”
Get full text
Get full text
-
1163
-
1164
-
1165
-
1166
Optimal virtual network function placement in multi-cloud service function chaining architecture
Published 2017“…Greedy approach has already been widely studied in the literature for the VM placement problem. Especially we compare our proposed heuristic with a greedy approach using first-fit decreasing (FFD) method. …”
Get full text
Get full text
-
1167
-
1168
-
1169
The Effect of Experimental Recuperative and Appetitive Post-lunch Nap Opportunities, With or Without Caffeine, on Mood and Reaction Time in Highly Trained Athletes
Published 2021“…N20 decreased 2CRT after PSD (pre: 411 ± 13 ms vs. post: 366 ± 20 ms; p < 0.001; d = 2.89; Δ% = 10.81) and NSN (pre: 418 ± 29 ms vs. post: 375 ± 40 ms; p < 0.001; d = 1.23; Δ% = 10.23). …”
Get full text
Get full text
Get full text
-
1170
-
1171
-
1172
-
1173
-
1174
Does Securitisation Make Monetary Policy Less Effective?
Published 2021“…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …”
Get full text
Get full text
Get full text
-
1175
-
1176
-
1177
-
1178
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
1179
-
1180