文章 — Recent
用 LaTeX 编写并由我们社区发布的论文、演示文稿、报告等。 在下面搜索或浏览。
![CV](https://writelatex.s3.amazonaws.com/published_ver/1978.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=bda253d290b20e1ebae3d01c9ec68cc6673b88416d756841b5e98e1f1e10bc5e)
CV
!TEX encoding = UTF-8 Unicode
LaTeX Template: Curriculum Vitae
Source: http://www.howtotex.com/
Feel free to distribute this template, but please keep the referal to HowToTeX.com.
Date: July 2011
Simon Renny-Byfield
![Network Security Analysis Based on Authentication Techniques](https://writelatex.s3.amazonaws.com/published_ver/1883.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=9950fc129b2a0df51062811af0a35714cda3df6b7bbfffd2b010bbc77724c287)
Network Security Analysis Based on Authentication Techniques
The Beamer class comes with a number of default slide themes
which change the colors and layouts of slides.
Rizwan Mughal
![Research Dissertation Process - SFAE](https://writelatex.s3.amazonaws.com/published_ver/1881.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=27084ce69f9fac7b718aebd3f695928a79fa12a7b8c9ccc28c8f2102e7859740)
Research Dissertation Process - SFAE
Beamer Presentation
LaTeX Template
Version 1.0 (10/11/12)
This template has been downloaded from:
http://www.LaTeXTemplates.com
License:
CC BY-NC-SA 3.0 (http://creativecommons.org/licenses/by-nc-sa/3.0/)
Ferdinand Othieno
![Mecanica](https://writelatex.s3.amazonaws.com/published_ver/1767.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=7c89717eba231f4a4d31b38a19588bd1bfbab5dfd6612f35a58ccc5995066299)
Mecanica
ALSO AT https://www.overleaf.com/2407528pjqwrc
Diego Restrepo
![Study truth table of Half Subtractor using Aim-Spice](https://writelatex.s3.amazonaws.com/published_ver/1660.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=1106adddc1bfaf910807b0fad1d57414ca51ff9145a3ee1b7567290d11cc2eb7)
Study truth table of Half Subtractor using Aim-Spice
The truth table of half subtractor is studied by using aims-spice software. The output of half subtracor is subtraction and borrow. The circuit for both subtraction and borrow is separately designed .
sunil p nagare
![Shiitake Cultivation on Logs](https://writelatex.s3.amazonaws.com/published_ver/1536.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=de79f8ce3cd579ba2f2e9a87eb7666867ebc62223a831efe7f8a7807fa2db3d3)
Shiitake Cultivation on Logs
Shiitake are delicious and easy to grow. They can be an excellent alternative crop because much of the work required can be done in the off-season. In addition, Shiitake grows in the shade of a forest and so does not compete for cultivated land. Shiitake are a source of vitamins, minerals, and up to 30\% protein with all essential amino acids. The objective of this one day hands-on workshop is to introduce farmers to the basic steps required to grow shiitake on logs. The course begins with an overview of fungal 'behavior' - the ecology and physiology of how they grow, fruit, reproduce, and interact with other organisms. This will provide a foundation for understanding how to cultivate and care for your logs and their fungal guests. We will learn to identify oaks, fell trees, and identify a suitable locations for logs. During incubation and fruiting stages. Lunch will provide an informal opportunity for questions. Following lunch, we will learn how to inoculate logs with shiitake spawn, and then set up a demonstration production line. Finally, we will discuss taking care of logs, forcing them to fruit on schedule, and some ideas on marketing. I hope that by the end of this class, students will leave ready to start a small shiitake production operation on their own.
David
![How to use axions to shine light through walls](https://writelatex.s3.amazonaws.com/published_ver/1515.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=92ad2372ae95b6c2a9790f42098e4d8d6d05e9685f9e536bdca462a40e4ad335)
How to use axions to shine light through walls
The axion is a hypothetical particle, introduced by the Peccei-Quinn theory in 1977 as a solution to the strong CP problem in quantum chromodynamics. The axion, if it exists, must have a very small mass, and must be very weakly interacting with baryonic matter, giving it the abbreviation WISP (Weakly Interacting Sub-ev Particle). The predicted attributes of the axion would give it the ability to pass directly through an opaque wall without obstruction, and this is how the ALPS experiment (Any Light Particle Search) at DESY in Hamburg is exploring the possibility of their existence. In this report, we will use matrix methods to reproduce the relationship between axion mass and axion coupling as published by the ALPS experiment \autocite{Ehret, K. et al (2010). New ALPS results on hidden-sector lightweights} in 2010, using their conversion probability to plot the result. Note that all equations, unless otherwise stated, are in natural units ($c=1$, $\hbar = 1$).
Nicholas Montague
![Human Activity Recognition with Smartphones](https://writelatex.s3.amazonaws.com/published_ver/1276.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=bdf0d6c88bde40132e92269a16a58dd88182f25f9b8464a943bc69aa32922082)
Human Activity Recognition with Smartphones
This report focuses on improving classification accuracy and reducing computational complexity for human activity recognition problem on public datasets UCI and WISDM. We discussed the benefits of getting access to smartphones in the filed of HAR research. Our experiment indicates that combining AdaBoost M1 algorithm with C4.5 contributes to discriminating several common human activities. Moreover, we showed that it is feasible to reduce computational complexity and achieve high accuracy at the same time by applying correlation-based feature selection.
songyaos
![CV](https://writelatex.s3.amazonaws.com/published_ver/1020.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T162953Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=c03535201eb9a1ad38c32d67cb366992ca98010e91488788da71987719b80cb1)
CV
CV
LAHER