Gallery Items tagged Project / Lab Report
If you conduct a scientific experiment or undertake a piece of research, you’ll usually need to write up a corresponding project or lab report, to summarize the objective of your task, the methods you followed, the results you obtained, and the conclusions you drew from your work. Here we provide a sample of great templates for producing such reports, which include layout guidelines to help guide you through the process.

Forced Van Der Pol's Equation
This work is going to analyze the Forced Van Der Pol's Equation which is used to analyze the electric circuit. In 1927, Balthasar Van Der Pol observed the stable oscillation and heard some irregular noise in vacuum tube circuit. He then proposed the Forced Van Der Pol's Equation to analyze the circuit and suggested the concept of limit cycle and Chaos to explain his observation. In this work, We would like to analyze behavior of the model by observing the phase space, time series, bifurcation diagram and power spectrum. Those points in the figures are calculated by Runge-Kutta Method with the aid of MATLAB. For a better understanding, the RLC circuit, which is a electric circuit consisting the a resistor, an inductor and a capacitor, will be used as an example for explaining the properties. Apart from electric circuit, the Forced Van Der Pol's Equation can be applied to dynamic systems in different aspect, such as the artificial heart, economic market and so on. Therefore, we suggest this work to all students since the Forced Van Der Pol's Equation can be applied to many majors, like Mathematics, Physics, Economics, Sociology, Biology, Engineering and so on.
Wallace, Homer

PRACTICA 1: Seguridad en el laboratorio.
Se realizaron las correspondientes mediciones según lo que se pedía en la práctica, esto para comprobar la resistencia en un circuito paralelo de manera calculada y otra midiéndola en un circuito real.
Se midió el valor de diversas resistencias observando el código de color y después de esto se midieron 10 resistencias iguales con un óhmetro para comprobar sus valores y de todos los procedimientos se saco el error absoluto, relativo y su porcentaje.
Pedro Mendoza

A Statistical Analysis of the Simpson College Football Offense
This project explores the predictability of play-calling of the Simpson College football offense during the years of 2012-2014. The models used to assess the predictability include simple analysis as well as linear and logistic regression.
Erik Hall

Filosofia Antiga
Artigo de pesquisa
leandro oliveira

Propuesta de Proyecto de Inteligencia Artificial
juego de ajedrez
Mariana Paucar

Lab 2 Fisica
Laboratorio de Fisica.
Maritza

Competition Robot Engineering Notebook for 2016 TYESA/ASEE
Engineering notebook, outlining the design process of an autonomous robot competing in the 2016 TYESA/ASEE robot parade competition.
Jacob Kiggins

Tensão de saída (Canal 2) e onda de tensão PWM (Canal 1), dados para tensão entrada de 23V.
Este artigo tem como objetivo relatar e detalhar a construção de um conversor buck-boost. Cuja a função deste é converter uma tensão cc (corrente contínua) de entrada, em outra tensão cc em sua saída, de valor mais elevado ou inferior dependendo de sua configuração. Destaca-se aqui o uso de um semi condutor MOSFET que funciona como uma chave controladora. Na elabiração deste está destacada o funcionamento, principais características e toda a parte de simulação e comprovação prática deste conversor.
Elison Moreira & Leandro Pereira

Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use.
In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd