# Articles — Popular

Papers, presentations, reports and more, written in LaTeX and published by our community. Search or browse below.

Where are our Providers?: Image Clustering based on Locations of Brazilian Government Suppliers
The Observatory of Public Spending (or ODP, in Portuguese) is a special unit of Brazil's Ministry of Transparency, Monitoring and Office of the Comptroller-General (or CGU, in Portuguese) responsible for monitoring public spending and gathering managerial and audit information to support the work of CGU internal auditors. One of the most important themes monitored by this unit is Public Procurements and Government Suppliers which have won these procurement processes. Image analysis of many of these suppliers headquarters revealed suspicious landscapes, such as rural areas, isolated places or slums. These landscapes could be an indication of fake suppliers with poor capacity of delivering public goods and services. However, checking thousands of landscapes in order to find these fake suppliers would be a very expensive task. Our objective then is to discover what are the possible groups of scenes involving government suppliers, given that these images were not previously labeled, as automatically as possible. For that reason, we used Places CNN, a pretrained convolutional neural network for scene recognition presented by Zhou et al., which was trained on 205 scene categories with 2.5 million images, for scene recognition on Brazilian Government Suppliers.
Rodrigo Peres Ferreira
Indoor Air Quality Assessment of Campus Spaces with Carbon Dioxide as a Measure of Adverse Health Effects
Indoor air quality (IAQ) is referred to as “the air quality within and around buildings and structures, especially as it relates to the health and comfort of building occupants” (US EPA, 2015). Indoor pollutant levels further determine the quality of indoor air, and one of the indicators used to measure IAQ is carbon dioxide (CO2). Drawing on data collected from a classroom, auditorium, and gym setting in the Mount Royal University campus, the aim of this report is to determine if CO2 levels present are within established margins substantial to result in adverse health effects. Environmental factors that are considered in this report include: room size, supply air, and occupant load in the specified spaces on the campus. The results of this study suggest that there are a myriad of factors that may affect IAQ and that CO2 is merely an indicator of poor air quality. Overall, peak indoor CO2 levels can further be used to determine appropriate ventilation rates in an indoor space.
Graham Brown, Isabella Luu
Computer Based Modeling 1
Fluid Report
Harry Morgan
Data acquisition from mobile sensors
Coursework project on data analysis. Using machine learning and android sensors data to predict whether gadget is located indoors or outdoors.
Matvey
ejerciciosBachi
Plantilla para crear ejercicios
Pablo
Using the One Dimensional Wave Equation to Represent Electromagnetic Waves in a Vacuum
The differential wave equation can be used to describe electromagnetic waves in a vacuum. In the one dimensional case, this takes the form $\frac{\partial^2\phi}{\partial x^2}-\frac{1}{c^2}\frac{\partial^2\phi}{\partial t^2} = 0$. A general function $f(x,t) = x \pm ct$ will propagate with speed c. To represent the properties of electromagnetic waves, however, the function $\phi(x,t) = \phi _0 sin(kx-\omega t)$ must be used. This gives the Electric and Magnetic field equations to be $E (z,t) = \hat{x} E _0 sin(kz-\omega t)$ and $B (z,t) = \hat{y} B _0 sin(kz-\omega t)$. Using this solution as well as Maxwell's equations the relation $\frac{E_0}{B_0} = c$ can be derived. In addition, the average rate of energy transfer can be found to be $\bar{S} = \frac{E_0 ^2}{2 c \mu _0} \hat{z}$ using the poynting vector of the fields.
Eric Minor
Propuesta de Proyecto de Electiva III
Minería de datos con Weka para la predicción del precio de automóviles de segunda mano
Mariana Paucar
Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use. In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd
Propuesta de Proyecto de Minería de Big Data
https://www.overleaf.com/3981477ddsxjk
Jorge Pilozo