Search alternatives:
main research » pain research (Expand Search)
Showing 881 - 900 results of 2,785 for search 'main research algorithm', query time: 0.15s Refine Results
  1. 881
  2. 882
  3. 883
  4. 884
  5. 885
  6. 886
  7. 887

    Automated detection of bicycle helmets using deep learning by Felix Wilhelm Siebert, Christoffer Riis, Kira Hyldekær Janstrup, Hanhe Lin, Jakob Kristensen, Oguzhan Gül, Frederik Boe Hüttel

    Published 2024-12-01
    “…Bicycle helmets are a main measure for injury prevention in case of a crash and are a central variable in transport safety studies. …”
    Get full text
    Article
  8. 888
  9. 889
  10. 890
  11. 891

    Competitive pricing and seed node selection in a two-echelon supply chain by Mohammad Hossein Morshedin, Seyed Jafar Sadjadi, Babak Amiri, Mahdi Karimi

    Published 2024-12-01
    “…To solve this model, we employ a meta-heuristic algorithm. Finally, the effect of the model's parameters on decision variables and the objective functions is discussed. …”
    Get full text
    Article
  12. 892
  13. 893
  14. 894
  15. 895
  16. 896
  17. 897
  18. 898

    Experimental assessment of communication delay's impact on connected automated vehicle speed volatility and energy consumption by Wan Li, Jackeline Rios-Torres, Boyu Wang, Zulqarnain H. Khattak

    Published 2024-12-01
    “…However, the exploration of communication delays on CAV operations and their energy use remains sparse in the literature. To fill the research gap, this study leverages the facilities at America Center of Mobility (ACM) Smart City Test Center to implement and evaluate a CAV merging control algorithm through vehicle-in-the-loop testing. …”
    Get full text
    Article
  19. 899
  20. 900

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…The main contribution and novelty of this research lies in leveraging the Isolation Forest algorithm for structured database workloads to proactively identify and mitigate potential security threats. …”
    Get full text
    Article