Articles tagged Project / Lab Report
If you conduct a scientific experiment or undertake a piece of research, you’ll usually need to write up a corresponding project or lab report, to summarize the objective of your task, the methods you followed, the results you obtained, and the conclusions you drew from your work. Here we provide a sample of great templates for producing such reports, which include layout guidelines to help guide you through the process.
Recent
![Aerodynamic Report](https://writelatex.s3.amazonaws.com/published_ver/9640.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=ad3772b61c9efef18a27f42450b350ce89379c5ff184f4a7e043e8b95e5e42ca)
Aerodynamic Report
TEP4160 lab report
Trym Haddal, Hugo Schleicher
![Ferromagnetism formal report](https://writelatex.s3.amazonaws.com/published_ver/3742.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=0bac47fe81d085847fb9273890ddb8d2424d26f196ad8f1eefe344cdcb9b8d77)
Ferromagnetism formal report
This report provides insight into the magnetic phenomenon of Hysteresis. Hysteresis is defined as a retardation effect where the magnetisation of a magnetic material lags behind the magnetizing force. Here we will explore the hysteresis loop for a silver steel ferromagnet and use this to discover it’s magnetic properties. The method used will be to place a ferromagnet inside a solenoid with an alternating voltage which will continually reverse the magnetic field and magnetism direction. The relation between these two quantities will be used to produce a hysteresis loop from which magnetic properties can be deduced. The results obtained were: saturation magnetisation = (8.4±0.5)(105)Am-1; remnant magnetisation = (5.9±0.5)(105)Am-1; coercive field: (4.3±0.5)(104)Am-1; energy expended per cycle per unit volume of material: (1.55±0.05)(103)Jm-3s-1; energy product: (8.7±3.0)(104)Jm-3.
David Scobie
![Final Project Report](https://writelatex.s3.amazonaws.com/published_ver/2689.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=dde5ee5fa50c6f84d71c14db20a030e8372ad746abb71978d6f89b69cfb0e9c0)
Final Project Report
Throughout the ECE Lab section we have learnt many electronics concepts and applied almost all of them directly or indirectly in our final lab project. Additionally, having taken away a lot from this course, we aimed to make a project that would challenge us academically and intellectually; for our final lab assignment, we made an autonomous line-following robot, that would follow a white line track using RedBot sensors, and would respond to audio cues from the environment using a microphone. In this report, we explain the use of each of the components that were used to make the final vehicle and the working of the vehicle itself.
Akashdeep Deb
![實驗一 基本測量](https://writelatex.s3.amazonaws.com/published_ver/2330.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=f647b9317a45a041e91f80bc332d6255dd8e1f525519fb82af9203e5b5f8ff3f)
實驗一 基本測量
目的:
熟悉分析實驗數據的方法,測量並分析誤差。
學習有效數的處理。
了解螺旋測微器(Micrometer)的操作方式並用以測定微小物體的厚度或直徑等。
了解游標尺(Vernier caliper)的操作方式並用以測量塑膠管的深度及內、外徑。
黃雅柔
![Tensão de saída (Canal 2) e onda de tensão PWM (Canal 1), dados para tensão entrada de 23V.](https://writelatex.s3.amazonaws.com/published_ver/7158.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=33919e22da22e0ab790a12ae0a45b2c64c9f1ba5df64b73fbffe3841a0f52f5d)
Tensão de saída (Canal 2) e onda de tensão PWM (Canal 1), dados para tensão entrada de 23V.
Este artigo tem como objetivo relatar e detalhar a construção de um conversor buck-boost. Cuja a função deste é converter uma tensão cc (corrente contínua) de entrada, em outra tensão cc em sua saída, de valor mais elevado ou inferior dependendo de sua configuração. Destaca-se aqui o uso de um semi condutor MOSFET que funciona como uma chave controladora. Na elabiração deste está destacada o funcionamento, principais características e toda a parte de simulação e comprovação prática deste conversor.
Elison Moreira & Leandro Pereira
![Analyse de projet](https://writelatex.s3.amazonaws.com/published_ver/7190.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=6a1f6886d7c2d765d41779ec2fc2691eb644d9fc10f07a4606694a4984bfd877)
Analyse de projet
There is the analysis of hPC
nisrine hammout
![Using Timing Attacks Against Cryptographic Algorithms](https://writelatex.s3.amazonaws.com/published_ver/6535.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=cb241daf1950aaa587b999480c4348e0d8dd1bf7b213ed108bb68b54e42fb9af)
Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use.
In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd
![Microlattice: Un material innovador](https://writelatex.s3.amazonaws.com/published_ver/4952.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=a614be2f1e660925bfdcd8514288ba6b95177a6a545d69dbba7d0129ef5e04c6)
Microlattice: Un material innovador
Microlattice
Andrea Pinzon, Mariana Gil y Angela Pinto
![Online Social Networks Influence Maximization, Bio-Inspired Approaches](https://writelatex.s3.amazonaws.com/published_ver/6135.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T182207Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=3de92542915de3c3d619259d09f5fd612c416bc8238a00b847bd6596c52c0236)
Online Social Networks Influence Maximization, Bio-Inspired Approaches
Università degli studi di Napoli Federico II
Scuola Politecnica e delle Scienze di Base
Corso di Laurea Magistrale in Ingegneria Informatica
Tesi di Laurea Magistrale in Big Data Analytics and Business Intelligence
Artificial Bee Colony
Influence Maximization
Guido del Puente