LaTeX templates and examples — Two-column
Recent

You can use this as a template for assignment

In this paper I demonstrate a novel design for an optoelectronic State Machine which replaces input/output forming logic found in conventional state machines with BDD based optical logic while still using solid state memory in the form of flip-flops in order to store states. This type of logic makes use of waveguides and ring resonators to create binary switches. These switches in turn can be used to create combinational logic which can be used as input/output forming logic for a state machine. Replacing conventional combinational logic with BDD based optical logic allows for a faster range of state machines that can certainly outperform conventional state machines as propagation delays within the logic described are in the order of picoseconds as opposed to nanoseconds in digital logic.

In this project the behavior of the Faraday cage as an insulator against an induced load, either by an effect of nature as lightning or lightning or power surges be considered. As we know the Faraday cage is a conductor of electric current and therefore theoretically there will be inside a magnetic field or electromagnetic wave in the same way there will be no magnetic field.

Las observaciones han mostrado que el numero de neutrinos electrónicos νe que llegan a la tierra desde el sol es aproximadamente la mitad del número esperado de nuestro conocimiento de las reacciones nucleares que ocurren al interior del sol. Estas observaciones se explican como el resultado de que algunos neutrinos electrónicos νe se convierten en neutrinos muónicos νμ y neutrinos tauónicos ντ durante su recorrido entre su creación al interior del sol y su observación en la tierra. Este cambio de un sabor a otro se conoce como oscilaciónes del neutrino. Se introduce un término de masa para el neutrino que es invariante de Lorentz en la densidad lagrangiana del modelo estándar (SM), y se describe el estado del neutrino |να⟩(α = e, μ, τ) como una combinación lineal de autoestados de masa |νi⟩ (i=1,2,3), lo cual conduce a las oscilaciones del neutrino.

日本バーチャルリアリティ学会大会2016投稿用のLaTeXフォーマットです

Distributed system is a collection of independent systems which can communicate with each other by transferring massages. There are some major issues in distributed systems but we focus in this paper on fault tolerance. It is the system’s ability to work in the condition when there occur any type of some fault in the system, like failure in communication, hardware or resources. It is a very important issue in distributed system, in this paper we present a survey of different types of fault tolerance techniques and their comparison.

Web security issues remain a major challenge with numerous security concerns, Distributed Denial of Service Attack (DDos) leads among these. It was evolved from DOS and its main purpose is to consume large amount of server resources so that the server cannot provide service to normal users. Attackers usually gain access to large number of computers by exploiting the vulnerabilities to set up attack armies (i.e., Botnets). This paper will review and analyse different existing DDoS detecting techniques against different parameters, and propose a new hybrid architecture for the defence mechanism of DDoS attack.

I prepared this template for my technical report writing class at Bilkent University. It is based on the IEEE peer review class.

Template for the 17th Workshop of Physical Agents WAF 2016.
\begin
Discover why 18 million people worldwide trust Overleaf with their work.