当前位置:网站首页>Latex usage
Latex usage
2022-04-23 10:47:00 【qq1033930618】
List of articles
One 、 picture
The whole layout
Long 18cm
\begin{
figure*}[htbp]
\centerline{
\includegraphics{
fig3.png}}
\caption{
Overview of model}
\label{
fig}
\end{
figure*}
Half a page
Long 8.5cm
Get rid of *
Two 、 form
https://www.tablesgenerator.com/latex_tables
Website preset format
Import three line table macro package
\usepackage{
booktabs}
\toprule[2pt] % First line
\toprule[1.5pt] % First line
\midrule[1.5pt]
\bottomrule[2pt]
\hline\hline % Double line
table* Double column
\centering In the middle
\begin{
tabular}{
c|cc|cc|cc|cc|cc|cc|cc} There are no vertical lines on both sides
\rule{
0pt}{
10pt} % Change row height
3、 ... and 、 Bold and italic
\textit{
}
\textbf{
}
Will compiler XeLaTex Change it to PdfLaTex
Four 、 reference
\usepackage[numbers,sort&compress]{
natbib}
\nocite{
*} % There are no references with citation labels
\bibliographystyle{
plain} % Citation style
\bibliography{
cankaowenxian} %bib file name , At the same time, this statement determines the location of the reference
plain Can be replaced by IEEEtran
Start with \usepackage[numbers,sort&compress]{
natbib} Ensure that the compilation is correct
Comment out can make the font smaller
The order of newly added references is wrong You can correct your mistakes bib Document name Change back and recompile
版权声明
本文为[qq1033930618]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230618497191.html
边栏推荐
- Notes on concurrent programming of vegetables (V) thread safety and lock solution
- Can Jerry's AES 256bit [chapter]
- Swagger2 接口如何导入Postman
- Embedded related surface (I)
- 1. Sum of two numbers (hash table)
- JUC concurrent programming 07 -- is fair lock really fair (source code analysis)
- 349、两个数组的交集
- Yarn core parameter configuration
- ID number verification system based on visual structure - Raspberry implementation
- SQL server query database deadlock
猜你喜欢

UEditor之——图片上传组件大小4M的限制
![[provincial election joint examination 2022 d2t1] card (state compression DP, FWT convolution)](/img/e4/3c47edbc3241ba86f10a1ac8a963fd.png)
[provincial election joint examination 2022 d2t1] card (state compression DP, FWT convolution)

Cve-2019-0708 vulnerability exploitation of secondary vocational network security 2022 national competition

部署jar包

Introduction to data analysis 𞓜 kaggle Titanic mission (III) - > explore data analysis

Notes on concurrent programming of vegetables (IX) asynchronous IO to realize concurrent crawler acceleration

101. Symmetric Tree

Solve the problem of installing VMware after uninstalling

JVM - common parameters

SQL Server 游标循环表数据
随机推荐
图像处理——噪声小记
202. Happy number
59. Spiral matrix (array)
第120章 SQL函数 ROUND
Yarn core parameter configuration
mysql同一个表中相同数据怎么合并
Reading integrity monitoring techniques for vision navigation systems - 5 Results
Charles 功能介绍和使用教程
SQL Server cursor circular table data
Esp32 learning - use and configuration of GPIO
LeetCode-608. Tree node
Sim Api User Guide(8)
Cve-2019-0708 vulnerability exploitation of secondary vocational network security 2022 national competition
Image processing - Noise notes
Linked list intersection (linked list)
142. Circular linked list||
全栈交叉编译X86完成过程经验分享
JVM——》常用命令
19、删除链表的倒数第N个节点(链表)
C#和数据库连接中类的问题