# Gallery — Project / Lab Report

Gallery Items tagged Project / Lab Report

Show all Gallery Items

If you conduct a scientific experiment or undertake a piece of research, you’ll usually need to write up a corresponding project or lab report, to summarize the objective of your task, the methods you followed, the results you obtained, and the conclusions you drew from your work. Here we provide a sample of great templates for producing such reports, which include layout guidelines to help guide you through the process.

Forced Van Der Pol's Equation
This work is going to analyze the Forced Van Der Pol's Equation which is used to analyze the electric circuit. In 1927, Balthasar Van Der Pol observed the stable oscillation and heard some irregular noise in vacuum tube circuit. He then proposed the Forced Van Der Pol's Equation to analyze the circuit and suggested the concept of limit cycle and Chaos to explain his observation. In this work, We would like to analyze behavior of the model by observing the phase space, time series, bifurcation diagram and power spectrum. Those points in the figures are calculated by Runge-Kutta Method with the aid of MATLAB. For a better understanding, the RLC circuit, which is a electric circuit consisting the a resistor, an inductor and a capacitor, will be used as an example for explaining the properties. Apart from electric circuit, the Forced Van Der Pol's Equation can be applied to dynamic systems in different aspect, such as the artificial heart, economic market and so on. Therefore, we suggest this work to all students since the Forced Van Der Pol's Equation can be applied to many majors, like Mathematics, Physics, Economics, Sociology, Biology, Engineering and so on.
Wallace, Homer
PRACTICA 1: Seguridad en el laboratorio.
Se realizaron las correspondientes mediciones según lo que se pedía en la práctica, esto para comprobar la resistencia en un circuito paralelo de manera calculada y otra midiéndola en un circuito real. Se midió el valor de diversas resistencias observando el código de color y después de esto se midieron 10 resistencias iguales con un óhmetro para comprobar sus valores y de todos los procedimientos se saco el error absoluto, relativo y su porcentaje.
Pedro Mendoza
A Statistical Analysis of the Simpson College Football Offense
This project explores the predictability of play-calling of the Simpson College football offense during the years of 2012-2014. The models used to assess the predictability include simple analysis as well as linear and logistic regression.
Erik Hall
Filosofia Antiga
Artigo de pesquisa
leandro oliveira
Lab 2 Fisica
Laboratorio de Fisica.
Maritza
Competition Robot Engineering Notebook for 2016 TYESA/ASEE
Engineering notebook, outlining the design process of an autonomous robot competing in the 2016 TYESA/ASEE robot parade competition.
Jacob Kiggins
Tensão de saída (Canal 2) e onda de tensão PWM (Canal 1), dados para tensão entrada de 23V.
Este artigo tem como objetivo relatar e detalhar a construção de um conversor buck-boost. Cuja a função deste é converter uma tensão cc (corrente contínua) de entrada, em outra tensão cc em sua saída, de valor mais elevado ou inferior dependendo de sua configuração. Destaca-se aqui o uso de um semi condutor MOSFET que funciona como uma chave controladora. Na elabiração deste está destacada o funcionamento, principais características e toda a parte de simulação e comprovação prática deste conversor.
Elison Moreira & Leandro Pereira
Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use. In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd