Galerieelemente in der Kategorie Project / Lab Report
If you conduct a scientific experiment or undertake a piece of research, you’ll usually need to write up a corresponding project or lab report, to summarize the objective of your task, the methods you followed, the results you obtained, and the conclusions you drew from your work. Here we provide a sample of great templates for producing such reports, which include layout guidelines to help guide you through the process.
Kürzlich
![實驗一 基本測量](https://writelatex.s3.amazonaws.com/published_ver/2330.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=4af959e68626dbc00216bf0035ad1055ca7573f77f7fe4f0b49e57e0819ef9bc)
實驗一 基本測量
目的:
熟悉分析實驗數據的方法,測量並分析誤差。
學習有效數的處理。
了解螺旋測微器(Micrometer)的操作方式並用以測定微小物體的厚度或直徑等。
了解游標尺(Vernier caliper)的操作方式並用以測量塑膠管的深度及內、外徑。
黃雅柔
![Tensão de saída (Canal 2) e onda de tensão PWM (Canal 1), dados para tensão entrada de 23V.](https://writelatex.s3.amazonaws.com/published_ver/7158.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=e50c64d52ec92251928f490902d221e60904220b2762ebc979c071caacddf270)
Tensão de saída (Canal 2) e onda de tensão PWM (Canal 1), dados para tensão entrada de 23V.
Este artigo tem como objetivo relatar e detalhar a construção de um conversor buck-boost. Cuja a função deste é converter uma tensão cc (corrente contínua) de entrada, em outra tensão cc em sua saída, de valor mais elevado ou inferior dependendo de sua configuração. Destaca-se aqui o uso de um semi condutor MOSFET que funciona como uma chave controladora. Na elabiração deste está destacada o funcionamento, principais características e toda a parte de simulação e comprovação prática deste conversor.
Elison Moreira & Leandro Pereira
![Analyse de projet](https://writelatex.s3.amazonaws.com/published_ver/7190.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=9ec01a9789941d572fc322be7e5d4e2e09857f6a6675d3ea055dc5488b5699d1)
Analyse de projet
There is the analysis of hPC
nisrine hammout
![Informes de laboratorio EIQ-UCR](https://writelatex.s3.amazonaws.com/published_ver/8097.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=85b787e9604fd54d3b55a2a8d1eb2d7d5cb9875df2a59aeaa012578601d8c101)
Informes de laboratorio EIQ-UCR
Plantilla para informes de laboratorio tipo artículo de la Escuela de Ingeniería Química de la Universidad de Costa Rica
Esteban Richmond Salazar, Francisco Escobar
![Using Timing Attacks Against Cryptographic Algorithms](https://writelatex.s3.amazonaws.com/published_ver/6535.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=ebcc6fcfef2155b95207fb95f74d4829cf32470bef31a5d31d8c3d5763c1a66f)
Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use.
In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd
![Microlattice: Un material innovador](https://writelatex.s3.amazonaws.com/published_ver/4952.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=98796432f65eb97da28acd757a82d086f34959ce00c84425998fe81b2ef714c5)
Microlattice: Un material innovador
Microlattice
Andrea Pinzon, Mariana Gil y Angela Pinto
![UTFPR-PB-EE-Template para Trabalhos](https://writelatex.s3.amazonaws.com/published_ver/6481.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=30cee9c5e8ff1c1ad0c4a532b5b2799ad6f69ab56c1f908f373a9551358d8d8a)
UTFPR-PB-EE-Template para Trabalhos
Um template para acelerar a produção de trabalhos para o curso de Engenharia Elétrica da UTFPR campus Pato Branco
Lael Santos
![Latex CEFET-MG](https://writelatex.s3.amazonaws.com/published_ver/19707.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=01b11a5930a32c27df4c1e2349f7b188c55211f324e4dc34a7629ef281596e98)
Latex CEFET-MG
Modelo de trabalho acadêmico utilizando LaTeX baseado nas normas da ABNT para o CEFET-MG.
Cristiano Fraga Guimarães Nunes
![Template for UNINA M.Sc. Thesis Project Report](https://writelatex.s3.amazonaws.com/published_ver/15298.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240701T011344Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240701/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=ac4769a0cde54c8817b9472cd1b60d2abb35e9292b2a123e501f7ad1e8b949d7)
Template for UNINA M.Sc. Thesis Project Report
This is a template for students that are going to graduate in Computer Engineering at the Federico II University of Naples.
Corso di Laurea in Ingegneria Informatica, Università degli Studi di Napoli Federico II