Showing 1,301 - 1,320 results of 1,769 for search '(( a non decrease ) OR ( 10 ((peter decrease) OR (((mean decrease) OR (a decrease)))) ))*', query time: 0.16s Refine Results
  1. 1301
  2. 1302
  3. 1303
  4. 1304
  5. 1305
  6. 1306
  7. 1307
  8. 1308

    Enhancing compressive, tensile, thermal and damping response of pure Al using BN nanoparticles by Penchal Reddy M.

    Published 2018
    “…In the present study, aluminum based metal matrix composites containing various amounts of boron nitride (BN) nanoparticulates (0, 0.5, 1.0 and 1.5 vol.%) were fabricated by using the powder metallurgy (PM) technique involving microwave sintering and hot extrusion process. …”
    Get full text
    Get full text
  9. 1309

    Effect of pH on dissolution of iron sulfide scales using THPS by Ahmed, Musa

    Published 2019
    “…Both experimental and theoretical techniques suggest that the pyrite dissolution ability of THPS decreases as pH increases. Conversely, combing THPS with EDTA (Ethylenediaminetetraacetic acid) proved effective in dissolving a mixture of different iron sulfide field scales. …”
    Get full text
    Get full text
  10. 1310
  11. 1311
  12. 1312
  13. 1313
  14. 1314

    Recycled Waste Tires Management in Constructions by Hamid, Salma Mohamed

    Published 2020
    “…The LCCA results show that the rubberized concrete (RC2), obtained by replacing 5% of aggregate and mixing it with seawater, is more cost-effective than RC1, with a cost savings of 30%.LCCA data were acquired by investigating thirteen concrete mixes (a control mix; 5%, 10%, and 20% rubber aggregate substitutions mixed with freshwater; and 0%, 5%, and 10% rubber aggregate substitutions mixed with seawater). …”
    Get full text
  15. 1315
  16. 1316
  17. 1317
  18. 1318
  19. 1319

    Deep learning for detection of routing attacks in the internet of things by YAVUZ, Furkan Yusuf

    Published 2018
    “…In our study, the Cooja IoT simulator has been utilized for generation of high-fidelity attack data, within IoT networks ranging from 10 to 1000 nodes. We propose a highly scalable, deep-learning based attack detection methodology for detection of IoT routing attacks which are decreased rank, hello-flood and version number modification attacks, with high accuracy and precision. …”
    Get full text
    Get full text
  20. 1320