# Articles — Project / Lab Report

Articles tagged Project / Lab Report

Show all Articles

If you conduct a scientific experiment or undertake a piece of research, you’ll usually need to write up a corresponding project or lab report, to summarize the objective of your task, the methods you followed, the results you obtained, and the conclusions you drew from your work. Here we provide a sample of great templates for producing such reports, which include layout guidelines to help guide you through the process.

Forced Van Der Pol's Equation
This work is going to analyze the Forced Van Der Pol's Equation which is used to analyze the electric circuit. In 1927, Balthasar Van Der Pol observed the stable oscillation and heard some irregular noise in vacuum tube circuit. He then proposed the Forced Van Der Pol's Equation to analyze the circuit and suggested the concept of limit cycle and Chaos to explain his observation. In this work, We would like to analyze behavior of the model by observing the phase space, time series, bifurcation diagram and power spectrum. Those points in the figures are calculated by Runge-Kutta Method with the aid of MATLAB. For a better understanding, the RLC circuit, which is a electric circuit consisting the a resistor, an inductor and a capacitor, will be used as an example for explaining the properties. Apart from electric circuit, the Forced Van Der Pol's Equation can be applied to dynamic systems in different aspect, such as the artificial heart, economic market and so on. Therefore, we suggest this work to all students since the Forced Van Der Pol's Equation can be applied to many majors, like Mathematics, Physics, Economics, Sociology, Biology, Engineering and so on.
Wallace, Homer
Propuesta de Proyecto de Electiva III
Minería de datos con Weka para la predicción del precio de automóviles de segunda mano
Mariana Paucar
Oscillation Lab
The purpose of this lab was to illustrate the validity of the law of conservation of energy along with the determination of the spring constant of a given spring. For the first part the spring constantk was to be found from a given spring. Through the suspension of various known metal masses on a vertically suspended spring, the spring constant was determined. Two methods were used: the algebraic rearrangement of Hooke's Law and a slope analysis of a linear regression on a Force (N) against Stretch Length (m) scatter plot. The spring constant k was determined to be 26.438 ± 1.063. For the second part of the lab, the aim was to validate the law of conservation of energy through the oscillation of a vertically suspended spring. Data was collected using a Vernier Motion Detector 2 machine and the various energies (kinetic energy, gravitational potential energy and spring potential energy) were collected and summed up. The sum of these energies yielded a fairly constant energy total (2.287 J ± 0.025 J) which supports the authenticity of the law of conservation of energy. While there were some uncertainties due to the lab setup, human error and equipment error it did not affect the validity of the methods during experimentation. Overall, the spring constant k of a given spring was determined and the law of conservation of energy was validated through the calculation of total energy during a suspended mass' oscillation.
Nikhil Patil
Flex shape gripper
Este trabajo presenta la aplicación de un conjunto de articulos con propias teorías de los robots manipuladores y el modelamiento de pinzas. Para ello el brazo humano se modela como un robot manipulador redundante. En particular se aplica el concepto de índices de desempeño para predecir posturas óptimas del brazo durante la realización de tareas. En el estudio se incluyen tanto estructuras estáticas, como tambien los analisis de estabilidad del brazo y los materiales para su respectiva realizacion. This work presents the application of a set of articles with the own theories of the manipulative robots and the modeling of tweezers. For this, the bearing is modeled as a redundant manipulator robot. In particular, the concept of performance indices is applied to predict the optimal postures of the task during the performance of tasks. The study includes both static structures, as well as safety management analyzes and materials for their respective realization.
Alex Villarroel Coca
Qualificação - Reconhecimento de Cenários baseado nas Localizações dos Fornecedores do Governo Federal
In most corruption scandals, the use of front companies for money laundering is almost ubiquitous. This work proposes to apply image classification to detect such organizations, through the use of Convolutional Neural Networks (CNN), namely the AlexNet architecture. The images are obtained by address search in Google Street View API, and the resulting classification will be further used along with other features to detect front com- panies in order to help the auditors from the Ministry of Transparency and Office of the Comptroller General (CGU, in Portuguese). To this moment, we applied classification to almost 15 thousand suppliers scenes with active contracts with the Brazilian Government until September 2016, obtained through data matching between the Government Purchases database and the Brazilian Federal Revenue Office database (more recent scenes should be added as this work progresses). Preliminary results with a pre-trained AlexNet CNN show the need for developing new scene classes more suited to the Brazilian context. In order to do this, we propose to apply clustering algorithms in features extracted from the last fully-connected layer of this net. The classes obtained will be used to fine-tune the AlexNet CNN for future classification, through the use of training from scratch or fine tuning techniques.
Rodrigo Peres Ferreira
What is the maximum altitude reached by a Superpressure balloon?Can we control the balloons altitude with an air pump?
A detailed report of findings on the altitudes which can be reached by super pressure balloons and how various factors and considerations affect this. Superpressure balloons are deployed and researched by various organisations including NASA, to solve technical limitations such as cell tower coverage as well as advancing fields of research. Balloons are used in planetary exploration, and weather prediction to teaching primary school physics. The versatile yet simple aerostat has been a valuable tool in many areas of engineering and their altitude ceiling is of great scientific interest. To solve the problem without the ability to physically reproduce the scenario, required mathematical models to be created as a means of simulating the effects of real world physics. A degree great enough to output an accurate and hence useful result without becoming too complex to be computable is the fine balance attempted to be created by this paper.
Charles Poppy
Simultaneous Localization And Mapping (SLAM) using RTAB-Map
This paper implements Simultaneous Localization and Mapping (SLAM) technique to construct a map of a given environment. A Real Time Appearance Based Mapping (RTAB-Map) approach was taken for accomplishing this task. Initially, a 2d occupancy grid and 3d octomap was created from a provided simulated environment. Next, a personal simulated environment was created for mapping as well. In this appearance based method, a process called Loop Closure is used to determine whether a robot has seen a location before or not. In this paper, it is seen that RTAB-Map is optimized for large scale and long term SLAM by using multiple strategies to allow for loop closure to be done in real time and the results depict that it can be an excellent solution for SLAM to develop robots that can map an environment in both 2d and 3d.
Sagarnil Das
Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use. In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd