Gallery Items tagged Two-column

Proyecto: Jaula de Faraday
In this project the behavior of the Faraday cage as an insulator against an induced load, either by an effect of nature as lightning or lightning or power surges be considered. As we know the Faraday cage is a conductor of electric current and therefore theoretically there will be inside a magnetic field or electromagnetic wave in the same way there will be no magnetic field.
Eduardo

LaTeX Template for Technical Report
I prepared this template for my technical report writing class at Bilkent University. It is based on the IEEE peer review class.
Robin Turner

Bachelorproefvoorstel
Bachelorproefvoorstel voor onderzoekstechnieken
KevinS

Statistics Formulae (Lind et. al. 2015)
Collection of statistics formulae taken from the perennial text book Lind, Douglas A. et. al. (2015): Statistical Techniques in Business and Economics, 16 ed. (2015).
Wolfgang W. Stoettner

Deep Learning
Deep learning is a fast growing field in tech that is often described to have limitless potential. This paper describes its history, why the explosion in popularity, and how it works. An example of classifying images of handwritten digits (MNIST) will be explored using a fully connected network and a convolutional neural network. Next, a brief description of the tools necessary for the reader to implement his or her own network. Finally, a view of the state of the art being developed by companies such as Google, Facebook, and Baidu.
Nolan Reis

Lab Report - Informe de laboratorio (Spanish)
Lab report template inspired by the Elsarticle's double column journal style.
Plantilla de informe de laboratorio inspirada en el estilo doble columna del paquete Elsarticle.
David Ramos

MODELO_INATEL_PG
Modelo para Elaboração de Artigos Científicos da Pós Graduação 2021
Phyllipe Lima, Nicole Luz

An analysis of DDos attacks that threaten the Cloud Environment
Web security issues remain a major challenge with numerous security concerns, Distributed Denial of Service Attack (DDos) leads among these. It was evolved from DOS and its main purpose is to consume large amount of server resources so that the server cannot provide service to normal users. Attackers usually gain access to large number of computers by exploiting the vulnerabilities to set up attack armies (i.e., Botnets). This paper will review and analyse different existing DDoS detecting techniques against different parameters, and propose a new hybrid architecture for the defence mechanism of DDoS attack.
Mitesh Bhopale

Plantilla UniMinuto
Adaptación de la plantilla IEEE for journals, para ser utilizada en los cursos de Ingeniería de Sistemas en la Universidad Minuto de Dios.
Ricardo Reyes-Jiménez