Articles — Popular

Papers, presentations, reports and more, written in LaTeX and published by our community. Search or browse below.

Digitising The Campus
Digitising The Campus
Thesis LaTeX Template Version 1.3 (21/12/12) This template has been downloaded from: http://www.latextemplates.com Original authors: Steven Gunn http://users.ecs.soton.ac.uk/srg/softwaretools/document/templates/ and Sunil Patel http://www.sunilpatel.co.uk/thesis-template/ License: CC BY-NC-SA 3.0 (http://creativecommons.org/licenses/by-nc-sa/3.0/) Note: Make sure to edit document variables in the Thesis.cls file
Robert Fletcher
What is the maximum altitude reached by a Superpressure balloon?Can we control the balloons altitude with an air pump?
What is the maximum altitude reached by a Superpressure balloon?Can we control the balloons altitude with an air pump?
A detailed report of findings on the altitudes which can be reached by super pressure balloons and how various factors and considerations affect this. Superpressure balloons are deployed and researched by various organisations including NASA, to solve technical limitations such as cell tower coverage as well as advancing fields of research. Balloons are used in planetary exploration, and weather prediction to teaching primary school physics. The versatile yet simple aerostat has been a valuable tool in many areas of engineering and their altitude ceiling is of great scientific interest. To solve the problem without the ability to physically reproduce the scenario, required mathematical models to be created as a means of simulating the effects of real world physics. A degree great enough to output an accurate and hence useful result without becoming too complex to be computable is the fine balance attempted to be created by this paper.
Charles Poppy
About Myself (LaTeX Exercise)
About Myself (LaTeX Exercise)
A simple document created with LaTeX.
Marck Ruther Sta. Ines
Using Timing Attacks Against Cryptographic Algorithms
Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use. In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd
Data acquisition from mobile sensors
Data acquisition from mobile sensors
Coursework project on data analysis. Using machine learning and android sensors data to predict whether gadget is located indoors or outdoors.
Matvey
Sommarmatte
Sommarmatte
Just some summer math courses.
Alexander Nielsen
Economía de la felicidad
Economía de la felicidad
En el siguiente ensayo, usted podrá encontrar encuestas que le brindaran información disponible en la pagina web del DANE, que le mostraran los diferentes estratos socioeconómicos en la ciudad de Medellín. El propósito de este ensayo es mostrar una relación entre los ingresos de los individuos y su felicidad. Dado a que la mayoría de la población de Medellín consta con bajos recursos y sufren necesidades por la falta de ciertas modalidades indispensables para sobrevivir, ellos son felices y están plenos con su estilo de vida.
Maicol Rojas
The domain of a composite function
The domain of a composite function
A short look at how to compute the domain of a composite function.
Aidan Horn
DC Homework 2
DC Homework 2
DC Homework 2
Kunal Lad