Articles tagged Project / Lab Report
If you conduct a scientific experiment or undertake a piece of research, you’ll usually need to write up a corresponding project or lab report, to summarize the objective of your task, the methods you followed, the results you obtained, and the conclusions you drew from your work. Here we provide a sample of great templates for producing such reports, which include layout guidelines to help guide you through the process.

Resonant enhancement of sensitivity in a Magnetic Tunnel Junction based Spin Torque Oscillator
In this work, we investigate the STO as a detector with in-plane geometry using field modulation Spin Torque ferromagnetic resonance (FM-STFMR), during which microwave signal is injected into the device and output response is measured in terms of RMS voltage across lock-in amplifier. The microwave signal injected externally to STO, efficiently synchronizes signal at two times the frequency of free oscillation of the nanomagnet (f0). The synchronization efficiently enhances signal sensitivity at 2f0 which opens other potential for development of spintronic devices. The effect of synchronization in STO under applied input RF power follows a consistent decrease in sensitivity with increasing power. Better synchronization at 2f0 is noticed above threshold current and shows good agreement with the results of numerical simulations.
Dhananjay Tiwari

Ultrasonic Positioning System
An indoor positioning system relying on time difference of arrival measurements of ultrasonic pings from fixed transmitters.
Code available at https://github.com/YingVictor/ultrasonic-positioning
Michael Danielczuk, Andrew Kim, Monica Lu, and Victor Ying

Estimación de la gravedad mediante métodos experimentales
En esta práctica se utilizarán conocimientos de cinemática para encontrar el valor de la aceleración gravitacional, por medio de dos experimentos diferentes, uno que involucra la caída libre y el otro involucra un péndulo, además, se estimará la confianza y validez de los resultados.
Emiliano Padilla, Diego Cabrera, María Fernanda

Detecting Insults in Social Commentary
This report gives an overview of the various machine learning algorithms implemented to detect certain comments that may appear insulting to another participant on a social networking platform. Feature selection was performed using n-grams, and the WEKA machine learning toolkit was used to build supervised learning clasifiers, that provided an accuracy of 82% on the test dataset. The dataset was obtained from the popular data science competition portal, Kaggle.
Prashant Ravi

Rapport stage Master-TFE
An internship report.
A. Sekely Dago

Design a NMOS and PMOS transistor circuit using virtuoso cadence and plot I-V characteristics of PMOS and NMOS for different gate and drain voltages
In this project we simulate NMOS and PMOS transistor circuit in cadence virtusso tool and the I/V characteristics
of PMOS and NMOS are observed
chaitanya

Data, Knowledge and design creativity
Paper for university project
Irene Chiocchia

A Methodology for Secure Sharing of Personal Health Records in Cloud Environment
Now a day every information is stored and shared on the cloud. And so the medical record especially
Personal Health Record (PHR) is an important part of health information exchange, that is need to be
stored at cloud servers. But there are various privacy problems as personal health information could be
discovered to unauthorized people. That need guarantee of the patient control over to their own PHRs,
in this method encryption of the PHRs is done before the storage on cloud. But still issues like risks
of privacy, efficiency in key administration, flexible access and efficient user administration, have still
remained the important challenge toward achieving better, cryptography imposed data access control.
In this research development, we develop a mechanism for control of data access to PHRs stored in
cloud servers. To achieve this efficient and modular data access control for PHRs, we provide encryption
approach for the encryption to each PHR file. For this system method already tried to focus on the
multiple data ownership scheme also dividing the users into security domains that highly reduce the
key management complication for owners and users. Here the system takes patient privacy as serious
issue and guaranteed it by exploiting multi-authority Encryption. Our main aim is not only privacy
but also systems scheme try to enable modification of access policies or file attributes, and break-glass
access under emergency situations. Our proposed scheme shows Extensive analysis and experimental
results are presented for security and efficiency of PHR.
Aaliya shaikh

Aerodynamic optimization of the DONuT (dron with oriented thrust) rotor
The present work analyses designs of coaxial rotor systems in an attempt to maximize its performance in hover flight. The study is carried out with the software XROTOR and CROTOR. Influence of parameters such as tip radius, revolutions per minute, lift coefficient and number of blades have been studied. The optimization process has been carried out on two possible models of the drone DONuT. Both of them are designed to allowfor torque cancellation. In order to validate the designs, the optimized models have been 3-D printed to be tested in a test bench.
Marion Marduel and Alfonso Velencoso Gomez