Articles tagged Project / Lab Report
If you conduct a scientific experiment or undertake a piece of research, you’ll usually need to write up a corresponding project or lab report, to summarize the objective of your task, the methods you followed, the results you obtained, and the conclusions you drew from your work. Here we provide a sample of great templates for producing such reports, which include layout guidelines to help guide you through the process.

Errors and Uncertainties - Lab Report
Physics being an experimental science, we sought to learn how to prepare a lab and perform as a team accounting for errors and uncertainties and to reduce them. We gathered values for volume using Micrometer, gathered information on acceleration, velocity, and created a histogram using a PASCO motion sensor. A jumping experiment was also performed with a human and the motion sensor. Our main goal was to test the effects of human error and eliminating mechanical error.
David Barnes

Margherita 2 Plotting, DAQ, and Heater Driving Recipes
After the fixture was sealed within the bell jar, the Margherita 2 underwent bakeout and a test seal on a one-inch tile. Following this small success, a larger project of sealing a larger tile during cesiation launched in the final week of the author's summer in the LAPPD Lab. Central to the ability to control these processes is the ability to monitor temperatures, pressures, and RGA plots as well as adjust heating inputs accurately and timely. This report documents the heating procedures, basic sealing cycle, and plotting past events or in real-time with the Margherita 2 infrastructure.
Rohan Lopez

Using Timing Attacks Against Cryptographic Algorithms
Computer algorithms that are written with the intent to keep data private are used in every day cryptography. These algorithms may exhibit execution time behaviour which is dependant on secret information that is not known to an outsider. When carefully analysed, this dependency may leak information that can be used to gain unintended access to private data, effectively nullifying the use of such algorithms. This threat poses a vital risk to the field of computer cryptography, and analysis should be done in attempt to eradicate this potential threat from any algorithms in modern day use.
In this paper, attacks are orchestrated against several algorithms that have previously been used in cryptography, resulting in the successful retrieval of secret data within a manageable time-scale.
Harry Budd

Online Social Networks Influence Maximization, Bio-Inspired Approaches
Università degli studi di Napoli Federico II
Scuola Politecnica e delle Scienze di Base
Corso di Laurea Magistrale in Ingegneria Informatica
Tesi di Laurea Magistrale in Big Data Analytics and Business Intelligence
Artificial Bee Colony
Influence Maximization
Guido del Puente

TRATAMIENTO DE AGUAS NEGRAS Y RESIDUALES Y SU IMPORTANCIA
tratamientos de aguas tanto negras como residuales y su importancia
Santiago Rivera

Base de datos NoSQL Persistencia Políglota
En los últimos años se ha visto un auge en el uso de los sistemas de bases de datos NoSQL y junto a ello se ha popularizado la idea de aplicaciones de Persistencia Políglota. Esta consiste en que gracias a la gran variedad y cantidad de datos, y los diversos servicios que pueden dar las aplicaciones hoy en día, es probable que un único tipo de sistema de almacenamiento no sea capaz de cubrir de forma eficiente todas las necesidades de la aplicación. En este articulo se dará una idea general de las Aplicaciones de Persistencia Políglota dando información acerca de su funcionamiento, arquitectura y motivación; y ademas se hablara específicamente de como aplicar la Persistencia Políglota con MongoDB y Neo4j.
Palabras Clave: NoSQL, Persistencia Políglota, MongoDB, Neo4j, Neo4j Doc Manager
Abelardo Moreno, David Fernandez, Alberto Suarez

Creating a Basic LED Driver for Raspberry Pi
Creating a driver to control a GPIO
Victor Ramirez, Rafael Lopez, Ramiro Rubio

Studying Quantum Dots using Atomic Force Microscopy
Quantum Dots are semiconductor nanocrystals whose diameter is in the range of 2-10 nm, corre- sponding to 10 to 50 atoms in diameter and a total of 100 to 100,000 atoms within the quantum dot volume. Many types of quantum dot emit light of specific frequencies if electricity or light is applied to them, and these frequencies can be precisely tuned by changing the dots’ size, shape and material, giving rise to many applica- tions. Because of their high tunable properties, quantum dots are of wide interest. It finds its applications in nanotechnology, medical imaging, transistors, solar cells, LED’s, diode lasers, quantum computing, etc. With this project, we intend to further understand and study the properties of quantum dots by using atomic force microscopy.
Anand Dwivedi

Optimizing The Linux Scheduler For Performance.
The CPU scheduling is the basis of multi-programming operating systems. By switching the
CPU among processes, the operating system can make the computer more productive. The
scheduler controls the way processes are managed in the operating system.
Linux supports preemptive multitasking, this means that the process scheduler decides which process
runs and when.
Balance performance across different computer configurations is one challenge in modern operating
systems.Linux has two separate process-scheduling algorithms.
If a Linux system performs similar tasks in a regular manner, it could be useful to implement
optimizations to the Linux scheduler to optimize the performance of those tasks.
In this project, we analyze and evaluate the impact of changing the kernel values on the performance
of the calculation of 8,765,4321 digits of pi using the Leibniz formula measuring the time that the
system takes to perform the calculation.
Constanza Madrigal Reyes and Ismael Lizárraga González