Results 1 - 10
of
3,487
A Comprehensive Overview
"... The concept of IAH was proposed in the late 1800s, forgotten after World War I, and rediscovered near the end of the 20th century.1 In 2004, a group of international physicians and surgeons formed the World Soci-ety of the Abdominal Compartment Syndrome (WSACS).2 The goal of this new organization wa ..."
Abstract
- Add to MetaCart
The concept of IAH was proposed in the late 1800s, forgotten after World War I, and rediscovered near the end of the 20th century.1 In 2004, a group of international physicians and surgeons formed the World Soci-ety of the Abdominal Compartment Syndrome (WSACS).2 The goal of this new organization was to develop a cohesive approach to the management of IAH and ACS, foster education and research, and develop consensus statements and definitions. WSACS has developed evidence-based defi-nitions, guidelines, and treatment algorithms and has identified evidence-based devices and methods to meas-ure intra-abdominal pressure (IAP).
A comprehensive overview of the Cold Spot
"... The report of a significant deviation of the CMB temperature anisotropies distribution from Gaussianity (soon after the public release of the WMAP data in 2003) has become one of the most solid WMAP anomalies. This detection grounds on an excess of the kurtosis of the Spherical Mexican Hat Wavelet c ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
coefficients at scales of around 10 degrees. At these scales, a prominent feature —located in the southern Galactic hemisphere — was highlighted from the rest of the SMHW coefficients: the Cold Spot. This article presents a comprehensive overview related to the study of the Cold Spot, paying attention
On-line and Off-line Handwriting Recognition: A Comprehensive Survey
- IEEE Transactions on Pattern Analysis and Machine Intelligence
"... AbstractÐHandwriting has continued to persist as a means of communication and recording information in day-to-day life even with the introduction of new technologies. Given its ubiquity in human transactions, machine recognition of handwriting has practical significance, as in reading handwritten no ..."
Abstract
-
Cited by 495 (8 self)
- Add to MetaCart
notes in a PDA, in postal addresses on envelopes, in amounts in bank checks, in handwritten fields in forms, etc. This overview describes the nature of handwritten language, how it is transduced into electronic data, and the basic concepts behind written language recognition algorithms. Both the on
Anomaly Detection: A Survey
, 2007
"... Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and c ..."
Abstract
-
Cited by 540 (5 self)
- Add to MetaCart
and comprehensive overview of the research on anomaly detection. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each category we have identified key assumptions, which are used by the techniques to differentiate between normal
A Survey of Computer Vision-Based Human Motion Capture
- Computer Vision and Image Understanding
, 2001
"... A comprehensive survey of computer vision-based human motion capture literature from the past two decades is presented. The focus is on a general overview based on a taxonomy of system functionalities, broken down into four processes: initialization, tracking, pose estimation, and recognition. Each ..."
Abstract
-
Cited by 515 (14 self)
- Add to MetaCart
A comprehensive survey of computer vision-based human motion capture literature from the past two decades is presented. The focus is on a general overview based on a taxonomy of system functionalities, broken down into four processes: initialization, tracking, pose estimation, and recognition. Each
A Comprehensive Overview of Basic Clustering Algorithms
"... This paper attempts to cover the main algorithms used for clustering, with a brief and simple description of each. For each algorithm, I have selected the most common version to represent the entire family. Advantages and drawbacks are commented for each case, and the general idea of possible sub-va ..."
Abstract
-
Cited by 28 (0 self)
- Add to MetaCart
This paper attempts to cover the main algorithms used for clustering, with a brief and simple description of each. For each algorithm, I have selected the most common version to represent the entire family. Advantages and drawbacks are commented for each case, and the general idea of possible sub-variations is presented
A comprehensive overview of the applications of artificial life
- ARTIFICIAL LIFE
, 2006
"... We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of ALife are shown by application studies. ALife application fields treated include robot control, robot manufacturing, p ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of ALife are shown by application studies. ALife application fields treated include robot control, robot manufacturing, practical robots, computer graphics, natural phenomenon modeling, entertainment, games, music, economics, Internet, information processing, industrial design, simulation software, electronics, security, data mining, and telecommunications. In order to show the status of ALife application research, this review primarily features a survey of about 180 ALife application articles rather than a selected representation of a few articles. Evolutionary computation is the most popular method for designing such applications, but recently swarm intelligence, artificial immune network, and agent-based modeling have also produced results. Applications were initially restricted to the robotics
A Comprehensive Overview on Different Network Simulators
"... Abstract — Network simulators are used worldwide for education, commercial and Industrial purposes to simulate any part or entire network. There are numerous network simulators used day by day. Network simulators can be used to produce an approximation result of the network, which lays foundation fo ..."
Abstract
- Add to MetaCart
for real time application or implementation. Researchers are not aware about facility and various network simulators available. Our Work gives an overview on different network simulators. Keywords- ns2, ns3, Qualnet, OPNET, OMNET++, TrSiM, Agent J I.
A Comprehensive Overview on Data Mining: Approaches and Applications
"... Abstract- Data Mining represents the process of decocting a previously unknown information from data. Advancement has lead to a sudden upsurge in large number of algorithms that effectively tackle the regular and computational task of data mining. Data mining can also be considered as retrieving kno ..."
Abstract
- Add to MetaCart
knowledge from large amount of data. Data mining offers great promise in helping organizations to uncover patterns hidden in their data that can be used to analyse the relationship and behaviour of customers and products with future trends.The key idea of this article is to provide an overview of data
Results 1 - 10
of
3,487