Articles — Recent
Papers, presentations, reports and more, written in LaTeX and published by our community. Search or browse below.

مسألة دالة اللوغاريامية مع المساحات
مسالة للدالة اللوعالاتمية
مع المساحات و قابلية الإشتقاق
bouanad

ANALYSIS OF FLIGHT-EFFICIENT ECOSYSTEM SOLUTIONS IN A MULTI-AIRCRAFT CONFLICT ENVIRONMENT
To accommodate future demands in air traffic management, this article qualitatively elaborates the multi-aircraft conflict resolution relying on the concept of an airborne ecosystem, as a set of autonomously operating aircraft whose trajectories are causally involved in a tactically detected conflict. The methodology provides two types of solutions: Air Traffic Control-based resolution that is considered as one from a set of compulsory avoidance maneuvers at a certain time instance, and the multi-agent simulated resolution as a product of the aircraft negotiation interactions and agreement on the avoidance maneuvers for the conflict state removal. The article further analyses a flight efficiency of the ecosystem resolution, in both distance and time, by comparing the compulsory against the negotiated solutions. From the total amount of tested trajectories and identified conflict patterns, three ecosystem scenarios have been randomly selected and efficiently quantified. Finally, the results have shown the significant savings in favor of the multi-agent solution approach.
Darryl Chan, Markov Radanovic

Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use.
In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd

Résumé
"ModernCV" CV and Cover Letter
LaTeX Template
Version 1.11 (19/6/14)
This template has been downloaded from:
http://www.LaTeXTemplates.com
Original author:
Xavier Danaux (xdanaux@gmail.com)
License:
CC BY-NC-SA 3.0 (http://creativecommons.org/licenses/by-nc-sa/3.0/)
Timothy Porter

Real Number
Notes
Irfan

Consumo de Alimentos Provenientes de Animales: el Mayor y Más Ignorado Factor Contaminante
Consumo de Alimentos Provenientes de Animales: el Mayor y Más Ignorado Factor Contaminante
ivan

Microlattice: Un material innovador
Microlattice
Andrea Pinzon, Mariana Gil y Angela Pinto

William Senfuma -- Résumé
William Senfuma's Résumé
William Senfuma

Espectro electromagnético
Beamer theme "Cuerna", version 1.0
Copyright Gubertino Cavalieri (mathsguy@bluesimplex.com)
October 2014. distributed under the GNU GPL Licence.
Fer Moreno