Search alternatives:
10 decrease » _ decrease (Expand Search)
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
a 10 » _ 10 (Expand Search)
10 decrease » _ decrease (Expand Search)
we decrease » _ decrease (Expand Search)
a decrease » _ decrease (Expand Search), _ decreased (Expand Search), _ decreases (Expand Search)
a 10 » _ 10 (Expand Search)
-
1101
-
1102
-
1103
Adaptive Network Coding over Cognitive Relay Networks
Published 2013“…Based on the diversity order analysis, we propose a framework for adaptive network coding. …”
Get full text
Get full text
-
1104
-
1105
-
1106
Hydropriming with moringa leaf extract mitigates salt stress in wheat seedlings
Published 2021“…Salinity is the major constraint that decreases the yield and production of crops. Wheat has a significant value in agricultural food commodities. …”
Get full text
Get full text
Get full text
-
1107
-
1108
-
1109
-
1110
Vertical zonation and functional diversity of fish assemblages revealed by ROV videos at oil platforms in The Gulf
Published 2018“…These results suggest that the vertical zonation pattern does not change, or only changes slightly, on a daily basis. The mean centers of mass of the most abundant fish species did not overlap, likely due to potential competition or niche differences. …”
Get full text
Get full text
-
1111
-
1112
-
1113
-
1114
-
1115
-
1116
Molecular and Structural Changes in Induced-Brain Stroke Tissue Using FTIR Imaging Spectroscopy, Scanning Electron and Atomic Force Microscopy
Published 2016“…All the samples were viewed with a FEI Quanta 200, USA scanning electron microscope at 10 kV. …”
Get full text
Get full text
-
1117
-
1118
Does Securitisation Make Monetary Policy Less Effective?
Published 2021“…We empirically investigate the interactions between securitisation activities and monetary policy using data from 1995 to 2015 for a panel of 10 European countries. …”
Get full text
Get full text
Get full text
-
1119
Deep learning for detection of routing attacks in the internet of things
Published 2018“…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
Get full text
Get full text
-
1120