Community articles — Journal articles
Discover a wide range of academic journal LaTeX templates for articles and papers which automatically format your manuscripts in the style required for submission to that journal.
Recent
![Techniques Of Electromagnetic Cloaking](https://writelatex.s3.amazonaws.com/published_ver/2160.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=2323382b83ed2dd6efb7d05683f29f81b7a4bbc0239aa5a2405fcda12056b14e)
How to conceal objects from electromagnetic radiation has been a hot research topic. Radar is an object detection system that uses Radio waves to determine the range , angle, or velocity. A radar transmit radio waves or microwaves that reflect from any object in their path. A receive radar is typically the same system as transmit radar, receives and processes these reflected wave to determine properties of object. Different organizations are working onto hide object from the radar in outer space. Any confidential object can be taken through space without being detected by the enemies. This calls for necessity of devising new method to conceal an object electromagnetically.
![IET Journal Submission (Electronics Letters example)](https://writelatex.s3.amazonaws.com/published_ver/4421.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=7daa64f33d7c7670d6088c02de9a0a1d08f85f81d399e004b520660a51cbdc1f)
With Overleaf, edit online instantly this IET Electronics Letters Journal example and download a PDF version. This project is also available on my web site
![Régression logistique pour la détection de matériau](https://writelatex.s3.amazonaws.com/published_ver/1620.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=9006acc87532f1d2740876ffab43ae52790042294e14088710ce7b5ba61603dc)
Template: (c) 2010 Association for Computing Machinery (ACM) For tracking purposes => this is v1.3 - March 2012
![Study of Electricity Theft Impact on the Economy of a Regulated Electricity Company](https://writelatex.s3.amazonaws.com/published_ver/5126.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=ec18f17009c06046aa4f0a6d4ac4547e2b8da6964609a638f3ddde4a291054af)
The Electricity theft is an economic issue for the electricity company due to unbilled revenue of consumers who commit such action. In a regulated scenario the company needs to fit within the laws of a regulatory agency (ANEEL in Brazil) and the loss of revenue is a problem that can compromise the compliance with regulatory targets and business efficiency. The objective of this article is to analyze how the energy theft impacts on the economy of the regulated company, consumers and society as a whole. Through the economic model Tarot (Optimized Tariff) it was possible through a concise and comprehensive manner to analyze the regulated electricity market using simulations and discover in which points the company operates optimally and through it to determine the economic indicators.
![Técnicas experimentales, Experimento 1](https://writelatex.s3.amazonaws.com/published_ver/2181.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=6310844b3aa055ee3521385470e1df9d894c0d7a14e71f75689bc0f667c70714)
En ésta páctica medimos y cuantificamos algunas de las propiedades de diferentes rocas, como la densidad y la masa, utilizando los equipos necesarios y comparándolas entre ellas para saber como es el comportamiento de las rocas que recolectamos. Al finalizar de hacer experimentos con las diferentes rocas, se compararon los resultados con los de otro equipo y se observ ́o que ambos resultados eran similares, lo que indica que cada tipo de roca tiene características diferentes de las demás, como su porosidad o densidad, independientemente de su masa o volumen.
![Implementação de Linguagens de Programação: Análise de otimizações em algoritmo com GCC](https://writelatex.s3.amazonaws.com/published_ver/7025.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=8e6e2796c0eb7e16ec627dca2f520b51c976b7f9d3a1a71f4297f19ec55a9d0b)
Optimization is a crucial step in the development context of algorithms, where depending on the purpose, different levels of optimization can be applied. Thus, the Network Dijkstra algorithm has been choosen in order to perform the compilation and execution with some levels of optimization from the GCC, measuring its execution time, number of cycles and instructions. In the present work, it is also discussed how the front-end and middle-end analyzes are performed in GCC.
![Adaptive Learning Rate Clipping Stabilizes Learning](https://writelatex.s3.amazonaws.com/published_ver/10572.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=38324a07ff03206c3f6c03b2c8bbd2ab348705b53714eab3029c465187fe7f99)
Adaptive learning rate clipping (ALRC) stabilizes learning by limiting backpropagated losses.
![An Approach Based on Bayesian Networks for Query Selectivity Estimation](https://writelatex.s3.amazonaws.com/published_ver/9973.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=5781f6638a95711187e473e69aaf9d04d839e02c96241694f214a2cbc9766bbd)
The efficiency of a query execution plan depends on the accuracy of the selectivity estimates given to the query optimiser by the cost model. The cost model makes simplifying assumptions in order to produce said estimates in a timely manner. These assumptions lead to selectivity estimation errors that have dramatic effects on the quality of the resulting query execution plans. A convenient assumption that is ubiquitous among current cost models is to assume that attributes are independent with each other. However, it ignores potential correlations which can have a huge negative impact on the accuracy of the cost model. In this paper we attempt to relax the attribute value independence assumption without unreasonably deteriorating the accuracy of the cost model. We propose a novel approach based on a particular type of Bayesian networks called Chow-Liu trees to approximate the distribution of attribute values inside each relation of a database. Our results on the TPC-DS benchmark show that our method is an order of magnitude. more precise than other approaches whilst remaining reasonably efficient in terms of time and space.
![IEEE Journal Submission (Trans. on MTT example)](https://writelatex.s3.amazonaws.com/published_ver/4422.jpeg?X-Amz-Expires=14400&X-Amz-Date=20241222T052825Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20241222/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=ce709e7eeb60964cc19de9cdebc6b138f63457e7dfd296a719e49938f8a5146f)
With Overleaf, edit online instantly this IEEE Transactions on Microwave Theory and Techniques Journal example and download a PDF version. This project is also available on my web site
\begin
Discover why 18 million people worldwide trust Overleaf with their work.