Gallery Items tagged Two-column

IEEE Journal Paper TemplateOfficial
This is a skeleton file demonstrating the use of IEEEtran.cls with an IEEE journal paper.
To start writing your manuscript in Overleaf, simply click the 'Open as template' button above. Additional IEEE templates are also available - please use the tags below to view. These include: additional article templates for specific journals (e.g. IEEE Photonics), templates for conference papers, and user-submitted examples and adaptations.
Michael Shell

IEEE LaTeX Template for Transactions on MagneticsOfficial
This is a skeleton template file demonstrating the use of IEEEtran.cls with an IEEE Transactions on Magnetics journal paper.
IEEEtran.cls version: 1.8b
Michael Shell

ISeCure Draft
This is an official template of The ISC International Journal of Information Security (ISeCure).
ISeCure is a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor. More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI and Scopus.
Nasour Bagheri , on the behalf of ISCISC

ICML2021 Template
ICML Template from: https://icml.cc/Conferences/2021/StyleAuthorInstructions
ICML

NAACL-HLT 2021 Latex Template
This document is a supplement to the general instructions for NAACL-HLT 2021 authors. It contains instructions for using the LaTeX style files for the conference.
The document itself conforms to its own specifications, and is therefore an example of what your manuscript should look like.
These instructions should be used both for papers submitted for review and for final versions of accepted papers.
Steven Bethard, Ryan Cotterell, Rui Yan, Kristina Toutanova, and others

Vietnamese IEEE Report Template
Vietnamese IEEE Report Template
Oanh Pham

My DAT620 Project Report
This document serves both as a template and a guideline for your report. You can replace headings and body text with your content. Before you start writing, however, we recommend that you carefully consider the instructions in this document.
leandernikolaus

Deployment and topology of a wireless sensor network for precision viticulture
Precision viticulture is a specialization of precision agriculture techniques applied to viticulture. Precision agriculture is the use of information system technologies applied to agricultural production. Some of the applicable technologies are; Wireless Sensor Networks (WSN), Global Positioning Systems (GPS), spectroscopy analysis of Near-Infrared (NIR), Geographic Information Systems (GIS). These systems provide means of observation, evaluation and control of agricultural activities. The farmers demand assistant systems to perform actions for saving time and avoiding risks. There are studies of maps crops and mesh-sampling techniques to predict the harvest volume in a vineyard with a certain varieties of grapes. The prediction is based on a previous study of crops over a period of three to four years. Along these three or four years a large volume of samples is taken to study several parameters. In this application area is where the wireless sensor networks technologies would have high incidence. In this context we intend to analyse, at first place, the specific characteristics of the operational environment of a vineyard. Second, we will analyse the most appropriate architecture for a sensor network in this environment. Application of wireless sensor networks technology can take many forms depending of environment, and implementation objectives. In this paper we discuss about the best procedure for deployment and the optimal topology of a wireless sensor network for viticulture.
Gregorio Corral

Two-Column Proof Example
An example of a geometry two-column proof template.
Overleaf