Gallery — Two-column

Gallery Items tagged Two-column

Show all Gallery Items

IFMBE Proceedings Series—Template and Instructions for Authors
IFMBE Proceedings Series—Template and Instructions for Authors
This paper presents instructions for preparing papers for the IFMBE Proceedings series. The template is intended to guide the authors in preparing the electronic version of their paper. Only papers prepared according to these instructions will be published in both, the paper and online version of the IFMBE proceedings. In this abstract section you should provide an abstract of your paper, not longer than 300 words.
IFMBE authors
JinKampSjabloon
JinKampSjabloon
Sjabloon Jinkampvoorbereiding volgens richtlijnen Scouts en Gidsen Vlaanderen
rafael
NIME Proceedings Template for LaTeX
NIME Proceedings Template for LaTeX
This paper provides a sample of a LATEX document for the NIME conference series. It conforms, somewhat loosely, to the formatting guidelines for ACM SIG Proceedings. It is an alternate style which produces a tighter-looking paper and was designed in response to concerns expressed, by authors, over page-budgets. It complements the document Author’s (Alternate) Guide to Preparing ACM SIG Proceedings Using LATEX2ε and BibTEX. This source file has been written with the intention of being compiled under LATEX2ε and BibTeX.
john harding (uploader)
DEVOLOPMENT OF AN ALGORITHM TO DETERMINATE THE ORIENTATION USING AN IMU
DEVOLOPMENT OF AN ALGORITHM TO DETERMINATE THE ORIENTATION USING AN IMU
In this paper we will study an algorithm designed by Madgwick which is commonly used to determine the orientation of a quadcopter. The algorithm uses a group of accelerometers, gyroscopes and magnetometers integrated in what is called an IMU as input. Some differences have been found between the results obtained by the original paper and the implementation done by the author. Therefore, a thorough study has been made, finding a miscalculation in the equations. The results show a relative average error in the orientation of 1,44 ppm.
andoni
template_assignment (ECL)
template_assignment (ECL)
Homework Assignment Article LaTeX Template Version 1.3.1 (ECL) (08/08/17)
Victor Zimmermann
SecurePost - An Android Tool for Trusted Social Media Posts
SecurePost - An Android Tool for Trusted Social Media Posts
his project is part of the FlowNet initiative. FlowNet aims at providing Internet freedom and free flow information through socially informed, censor resistant online social networks. My contribution for FLowNet is in devel- oping an Android application, SecurePost. The requirement for SecurePost is two-fold. First, the system should facilitate secure, anonymous, group communication within a closed group of trusted members. Second, the general public on the Internet viewing this content, should be able to verify that the content was generated only by the said closed group of trusted members. The system consists of an Android client application, a proxy server and a browser-plugin. The OSNs supported by this system are Twitter and Facebook.
pritha
IMAPS Conference Template
IMAPS Conference Template
A LaTeX template done in the style of the provided MS Word document for the International Microelectronics Assembly and Packaging Society (IMAPS) conference for 2017.
Jennifer Byford
Protocole IOT : vulnérabilités connues
Protocole IOT : vulnérabilités connues
L’Internet of Things (IoT), ou l’Internet des Objets (IdO), est considéré comme étant un concept moderne, et à même de révolutionner l’avenir proche. L’intérêt est de créer un environnement composé d’appareils et de systèmes intelligents, pouvant communiquer entre eux par le biais de réseaux informatiques. Ces échanges de données vont ainsi permettre de meilleures prises de décision dans un contexte de plus en plus complexe. Cependant, au fur et à mesure que les échanges se multiplient, la question de sécurité se pose, qui doit prendre en compte la faible puissance de calculs des appareils. Ce document a pour objectif de se focaliser sur les protocoles qui régissent ces échanges, et quelles sont les problématiques de sécurité qui en découlent.
Klight
Jogo da Cobrinha em Assembly MIPS
Jogo da Cobrinha em Assembly MIPS
O programa detalhado a seguir apresenta a jogo da cobrinha implementado em Assembly MIPS
jv munhoz

Related Tags

PortugueseHandoutHomework AssignmentInternational LanguagesMathUniversityAlgorithmBiberBibLaTeXConference PaperRésumé / CVElectronicsPhysicsSource Code ListingFrenchPortuguese (Brazilian)Getting StartedEssaySpanishGermanLuaLaTeXGeophysicsProject / Lab ReportAcademic JournalThesisKoreanNorwegianF1000ResearchXeLaTeXArabicSEGTeXSociety of Exploration GeophysicistsReykjavík UniversityUniversidad Nacional Autónoma de MéxicoUniversidad de Costa RicaJapaneseIEEE Official TemplatesIEEE (all)IEEE Community Templates and ExamplesSIGCHIUniversidade Federal do Rio Grande do SulVietnameseChineseUniversidade de LisboaUniversidad Autónoma de OccidenteAssociation for Computational LinguisticsUniversity of PortoResearch ProposalLecture NotesDutchTechnical ManualCERNSAGE PublicationsHumanitiesUniversity of California, DavisDictionaryDirect Submission LinkEurographicsbioRxivRoyal Meteorological Society (RMetS)Senter for klinisk dokumentasjon og evaluering (SKDE)F1000Research - Official TemplatesAssociation for Computing Machinery (ACM) - Official Sample PapersAssociation for Computing Machinery (ACM) - Official Master TemplatesVrije Universiteit Brussel (VUB)PreprintsAveiro UniversitySoftware EngineeringUniversidad Nacional de San AgustínInstituto Nacional de Telecomunicações (INATEL)