Gallery — Recent

A gallery of up-to-date and stylish LaTeX templates, examples to help you learn LaTeX, and papers and presentations published by our community. Search or browse below.

Teste
Teste
Teste
Bruno Lopes
DE1-MEM  Complex Numbers Tutorial Sheet
DE1-MEM Complex Numbers Tutorial Sheet
DE1-MEM Complex Numbers Tutorial Sheet with solutions
Mathmos
A Methodology for Secure Sharing of Personal Health Records in Cloud Environment
A Methodology for Secure Sharing of Personal Health Records in Cloud Environment
Now a day every information is stored and shared on the cloud. And so the medical record especially Personal Health Record (PHR) is an important part of health information exchange, that is need to be stored at cloud servers. But there are various privacy problems as personal health information could be discovered to unauthorized people. That need guarantee of the patient control over to their own PHRs, in this method encryption of the PHRs is done before the storage on cloud. But still issues like risks of privacy, efficiency in key administration, flexible access and efficient user administration, have still remained the important challenge toward achieving better, cryptography imposed data access control. In this research development, we develop a mechanism for control of data access to PHRs stored in cloud servers. To achieve this efficient and modular data access control for PHRs, we provide encryption approach for the encryption to each PHR file. For this system method already tried to focus on the multiple data ownership scheme also dividing the users into security domains that highly reduce the key management complication for owners and users. Here the system takes patient privacy as serious issue and guaranteed it by exploiting multi-authority Encryption. Our main aim is not only privacy but also systems scheme try to enable modification of access policies or file attributes, and break-glass access under emergency situations. Our proposed scheme shows Extensive analysis and experimental results are presented for security and efficiency of PHR.
Aaliya shaikh
A Study in Percolation Models and Algorithms
A Study in Percolation Models and Algorithms
By adapting a previously written percolation model in C, the threshold probabilities for square, triangular, and cubic lattice types were confirmed. An algorithm to count the distribution of cluster sizes at a variety of percolation probabilities was developed, and the expected trends towards the so called infinite cluster was achieved. An equivalent bond percolation model was adapted to the original site algorithm, and by treating occupied bonds as springs, a total compression trend for the model was constructed, which implied that structures under the boundary conditions that were imposed does not have behavior that changes the total compression constant significantly at the percolation threshold.\\
Victor Rice
Plantilla IMTR 3013 - Vision Artificial
Plantilla IMTR 3013 - Vision Artificial
Plantilla para informes de laboratorio del curso de visión artificial en la Universidad Tecnológica de Bolívar. Basado en ECE 100 Template por Patrick Bartman.
Andres Marrugo
P92
P92
problem 92
ttomczak
Introduction
Introduction
Python tutorials
Sudhanshu Mishra
Performance Time Report
Performance Time Report
A performance time evaluation between a C lexer and a Lex generated lexer.
Carmina Pérez Guerrero
Creation of a Pong Game Through Visual Basic.NET
Creation of a Pong Game Through Visual Basic.NET
This is the trials of creating a simple Pong game in six days time. there were severak errors along the way, and the game itself was never actually completed, but it was a fantastic learning experience that will prepare me for future programming courses.
Antony