Showing 1,101 - 1,120 results of 1,766 for search '(( a 10 decrease ) OR ( 10 ((we decrease) OR (((mean decrease) OR (a decrease)))) ))*', query time: 0.19s Refine Results
  1. 1101
  2. 1102
  3. 1103

    Adaptive Network Coding over Cognitive Relay Networks by Chun, Young Jin

    Published 2013
    “…Based on the diversity order analysis, we propose a framework for adaptive network coding. …”
    Get full text
    Get full text
  4. 1104
  5. 1105
  6. 1106

    Hydropriming with moringa leaf extract mitigates salt stress in wheat seedlings by Ahmed, Talaat

    Published 2021
    “…Salinity is the major constraint that decreases the yield and production of crops. Wheat has a significant value in agricultural food commodities. …”
    Get full text
    Get full text
    Get full text
  7. 1107
  8. 1108
  9. 1109
  10. 1110

    Vertical zonation and functional diversity of fish assemblages revealed by ROV videos at oil platforms in The Gulf by Ben-Hamadou, Radhouan

    Published 2018
    “…These results suggest that the vertical zonation pattern does not change, or only changes slightly, on a daily basis. The mean centers of mass of the most abundant fish species did not overlap, likely due to potential competition or niche differences. …”
    Get full text
    Get full text
  11. 1111
  12. 1112
  13. 1113
  14. 1114
  15. 1115
  16. 1116
  17. 1117
  18. 1118

    Does Securitisation Make Monetary Policy Less Effective? by Qanas, Jalal

    Published 2021
    “…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …”
    Get full text
    Get full text
    Get full text
  19. 1119

    Deep learning for detection of routing attacks in the internet of things by YAVUZ, Furkan Yusuf

    Published 2018
    “…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
    Get full text
    Get full text
  20. 1120