overleaf template galleryLaTeX templates and examples — Recent
Discover LaTeX templates and examples to help with everything from writing a journal article to using a specific LaTeX package.

This article presents the activities carried out in the compulsory stage for the completion of the Technical Course in Integrated Computing IFRS - Campus Ibirubá . These are focused on software development area, with a brief involvement in the hardware area.

CS 155 HW 9

This is jut a college classwork.

Se pretende describir el decaimiento de una partícula α encontrando los niveles de energía Eα correspondientes a los estados ligados de la partícula producto de la desintegración. Los niveles de energía y los estados ligados se encuentran mediante dos métodos de aproximación: WKB y diferencias finitas. Posteriormente se halla el tiempo de vida medio τ, se comparan los resultados con los de la literatura y se decide el mejor método de solución acorde con la literatura.

In this experiment we conducted bending tests on several different specimens of Aluminum as well as Ceramics. Using the data gathered from these tests as well as measurements we took of their primary dimensions, we calculated (for each specimen) modulus of rupture, flexure strain, Young's modulus, as well as specific strength and stiffness. These tests gave us insight into new characteristics of aluminum and ceramics that allowed us to better understand their applications in industry.

Elegant business card template with photo, and space for a GPG key fingerprint. You might also be interested the original template with a QR code (for a MECARD).

John C. Flournoy, CV http://jflournoy.gitlab.io/

The problems on HW 7 all lined up and ready for proofs!

Watermarking technique for the image is an efficient method for protecting copyright image, and also a huge topic in cryptography. In this paper, two spread spectrum watermarking scheme, the Convolution Image-based Model (CIM) and the Exponential Convolution Image-based Model (ECIM) are going to be formulated and discussed. The watermarking experiment result will be shown and discussed, focusing on the attack scheme, protectability, and the information encryption of the watermark. We will show that the convolution image-based model for invisible watermark is weak of protectability, but it is able to hide the information (the size of watermark must be less than the original image) and store inside the image.
\begin
Discover why over 20 million people worldwide trust Overleaf with their work.