Articles tagged Two-column
Recent
![Laboratory 4 (LEX vs C)](https://writelatex.s3.amazonaws.com/published_ver/9283.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125248Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=61e630702072ce51fc7755650c0354afb36dcaf6d02915e6dae81cca52e1bc31)
Laboratory 4 (LEX vs C)
Laboratory where LEX is compared to C
Jorge Adrian Padilla Velasco
![A Latex Tutorial](https://writelatex.s3.amazonaws.com/published_ver/3068.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125248Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=dbc1c2a9ef033550402902e49dcc2896ca29f14889f7e72e7ea2975fb1a14e69)
A Latex Tutorial
This LaTeX tutorial will introduce LaTeX, creating a .tex file, sections, body text, tables, figures, mathematical formulas, acknowledgements, and references.
Daniel Ruatta
![Density Of Ice](https://writelatex.s3.amazonaws.com/published_ver/4081.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125248Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=9f3f7bb9cb4d2048b301925cab1518134689dd5c68b5f5093afe89f7854f700f)
Density Of Ice
The density of solid water, unlike most molecules, is less than that of its liquid form. Its precise value is of use in many applications. Freezing a spherical droplet of water and analyzing the changed shape from a sphere to a sphere with a slight peak in order to find the density of ice. We find the density of ice to be at 0.90 ± 1.66 · 106 g/mL. The precision of our measurement was limited by uncertainty in the angle measurements of the peak of the droplet.
Ashley
![A Review on Covert Techniques](https://writelatex.s3.amazonaws.com/published_ver/1903.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125248Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=b98f8fb92964cdb92f118b5fbdf9fa4333f4d44537c3a3840aa00af3d6c6a43a)
A Review on Covert Techniques
Due to the widespread adoption of the internet and its services, protocols have been established and new ones arise every year. Either for securing connections, ciphering information or service authentication, protocols place an important part in network communications. The TCP/IP has become one of the ubiquitous protocol suites for secure communication, and therefore, a desirable target for covert information encapsulation. In this article, we will discuss the art of unauthorized data transfer - covert techniques - for data encapsulation in protocol data packets, emphasizing headers fields manipulation.
Marcelo Santos, Luis Barroso
![Video Digital y Procesamiento de Imágenes](https://writelatex.s3.amazonaws.com/published_ver/3436.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125249Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=275dfa18b6ff0814458aa589b5109166d292e1f3d6daf26f3e620dbeac17c425)
Video Digital y Procesamiento de Imágenes
En este documento se encuentra el desarrollo del primer laboratorio de la asignatura Vídeo Digital y Procesamiento de Imágenes el cual trata sobre el análisis de los sensores fotográficos y los metadatos de las imágenes tomadas, Ademas de la creación de algunos scripts en el programa Matlab para lo que se tiene que tener en cuenta la información de geolocalización o GPS de las imágenes.
Keywords — GPS, Matlab, Metadatos
Ricardo Correa
![Electric Circuits Final Project - Alternative Chua's Circuit](https://writelatex.s3.amazonaws.com/published_ver/8069.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125249Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=cae25cd29ba9b6af42c6e638abdedfb1b4ca06ee46dec3e9a75f7daa040e1584)
Electric Circuits Final Project - Alternative Chua's Circuit
Projeto lab CE2
Danilo Freitas
![The Noscuk](https://writelatex.s3.amazonaws.com/published_ver/3670.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125249Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=6188586f757e1faeb6001bcacb770738c7fe6893a21ccb4e932f63957f9b04ab)
The Noscuk
Let's take a look into the dynamic history
of the Noscuk valley and its people.
Eugenia Anane-Wae
![An analysis of DDos attacks that threaten the Cloud Environment](https://writelatex.s3.amazonaws.com/published_ver/3662.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125249Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=f363da32eb4724cd4573b816186b15b1f09451e09be0d846835f8589c95fa445)
An analysis of DDos attacks that threaten the Cloud Environment
Web security issues remain a major challenge with numerous security concerns, Distributed Denial of Service Attack (DDos) leads among these. It was evolved from DOS and its main purpose is to consume large amount of server resources so that the server cannot provide service to normal users. Attackers usually gain access to large number of computers by exploiting the vulnerabilities to set up attack armies (i.e., Botnets). This paper will review and analyse different existing DDoS detecting techniques against different parameters, and propose a new hybrid architecture for the defence mechanism of DDoS attack.
Mitesh Bhopale
![WQFS Spinitron Manual](https://writelatex.s3.amazonaws.com/published_ver/9238.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T125249Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=cf214f7fd54b19d950465486cb882e6c904d985c4fcf22a7ef11af16c71cf75e)
WQFS Spinitron Manual
Spinitron V2 Manual for Radio DJs
Will Nowatka