Ara es mostren els items 20639-20658 de 245498

    • Anomaly detection using Computer Vision for fusion power generation 

      Cano Aguilera, Abraham (Universitat Politècnica de Catalunya, 2020-06-29)
      Treball Final de Grau
      Accés obert
      Through the years, nuclear fission, the most extended way to generate nuclear energy, has been subject of debate because its detrimental effects in the environment as well as our health. By now nuclear fusion is emerging ...
    • Anomaly-based fault detection in wind turbine main bearings 

      Campoverde-Vilela, Lorena; Feijóo, Maria del Cisne; Vidal Seguí, Yolanda; Sampietro Saquicela, José Luis; Tutivén Gálvez, Christian (Copernicus Office, 2023-04-14)
      Article
      Accés obert
      Renewable energy is a clean and inexhaustible source of energy, so every year interest in the study and the search for improvements in production increases. Wind energy is one of the most used sources of energy, and therefore ...
    • Anonimato en blockchain: Monero 

      Segura Ramirez, Samuel (Universitat Politècnica de Catalunya, 2020-07-13)
      Treball Final de Grau
      Accés obert
      Blockchain is a decentralized database that records blocks of information and links one block to the previous ones by means of cryptographic functions. In this way, information integrity is guaranteed. So far, the main ...
    • Anonymising personal data extracted from social networks 

      Duffett van der Spuy, Carlo Craig (Universitat Politècnica de Catalunya, 2019-01)
      Treball Final de Grau
      Accés obert
      With the activation of the latest GDPR legislation, companies are restricted in the use of the user data which has been collected. This data was able to be process in many ways without the user?s permission, but now the ...
    • Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach 

      Rodríguez Hoyos, Ana Fernanda; Estrada Jiménez, José Antonio; Rebollo-Monedero, David; Forné Muñoz, Jorge; Trapero Burgos, Rubén; Álvarez Romero, Antonio (ISCRAM, 2019)
      Text en actes de congrés
      Accés obert
      Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. ...
    • Anonymizing data via polynomial regression 

      Nin Guerrero, Jordi; Pont Tuset, Jordi; Medrano Gracia, Pau; Larriba Pey, Josep; Muntés Mulero, Víctor (2007)
      Text en actes de congrés
      Accés obert
      The amount of confidential information accessible through the Internet is growing continuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of individuals. ...
    • Anonymizing personal images using generative adversarial networks 

      Piacentino, Esteban; Angulo Bahón, Cecilio (Springer, 2020)
      Comunicació de congrés
      Accés restringit per política de l'editorial
      This paper introduces a first approach on using Generative Adversarial Networks (GANs) for the generation of fake images, with the objective of anonymizing patients information in the health sector. This is intended to ...
    • Anonymizing trajectory data: limitations and opportunities 

      Guerra Balboa, Patricia; Miranda Pascual, Àlex; Parra Arnau, Javier; Forné Muñoz, Jorge; Strufe, Thorsten (AAAI Press (Association for the Advancement of Artificial Intelligence), 2022)
      Comunicació de congrés
      Accés restringit per política de l'editorial
      A variety of conditions and limiting properties complicate the anonymization of trajectory data, since they are sequential, high-dimensional, bound to geophysical restrictions and easily mapped to semantic points of interest ...
    • Anonymous Communication Systems 

      Escola Tècnica Superior d'Enginyeria de Telecomunicació de Barcelona; Facultat d'Informàtica de Barcelona; Universitat Politècnica de Catalunya. Institut de Ciències de l'Educació (2021-11-30)
      Audiovisual
      Accés obert
      Anonymous Communication Systems How to be protected against traffic analysis?
    • Anonymous subscription schemes : a flexible fonstruction for on-line services access 

      González Vasco, Maria Isabel; Heidarvand, Somayed; Villar Santos, Jorge Luis (IEEE Press. Institute of Electrical and Electronics Engineers, 2010)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In traditional e-cash systems, the tradeoff between anonymity and fraud-detection is solved by hiding the identity of the user into the e-coin, and providing an additional triggering mechanism that opens this identity in ...
    • Anonymous threshold signatures 

      Hlad Colic, Petar (Universitat Politècnica de Catalunya, 2018-07)
      Projecte Final de Màster Oficial
      Accés obert
      Aquest treball tenia l'objectiu de trobar un esquema de llindar de signatura an\`onima compacte. Tot i no haver-ne trobat cap, s'analitzen diverses solucions que s'acosten a l'objectiu publicades per altres autors i es ...
    • Anonymous yes-no voting with abstention and multiple levels of approval 

      Freixas Bosch, Josep; Zwicker, William S. (Academic Press, 2009-11)
      Article
      Accés obert
      Els jocs simples simètrics (3, 2) serveixen de models per a sistemes de votació anònims en els quals cada votant pot votar "sí", abstenir-se, o votar "no", el resultat és "sí" o "no", i els votants juguen papers intercanviables. ...
    • Anopore confinement in the cyanobiphenyl-based liquid crystal dimer CB7CB. A dielectric study 

      Robles Hernández, Beatriz; Sebastián, Nerea; de la Fuente Lavin, Maria Rosario; López Pérez, David Orencio; Salud Puig, Josep; Díez Berart, Sergio (2023-12-21)
      Article
      Accés restringit per política de l'editorial
      We report an experimental work on the liquid crystal dimer 1’’,7’-bis(4-cyanobiphenyl-4’-yl) heptane (CB7CB) confined to Anopore membranes. We have studied the behaviour of the dielectric relaxation modes in the isotropic ...
    • Anotaciones de las bases de datos 

      Mindan, Pere J.; Raventós, Arnau; Mur, Olga; Tarrés Ruiz, Francisco; Torres Urgell, Lluís (2011-11-30)
      Report de recerca
      Accés restringit per acord de confidencialitat
      Entregable 1.2.2
    • Anotaciones de Merlín, comportamiento de universos y semántica algebraica 

      Nivela Alós, M. Pilar Brígida; Orejas Valdés, Fernando (E.T.S.I. de Telecomunicación, 1985)
      Text en actes de congrés
      Accés obert
      En este trabajo se presentan las ideas básicas seguidas para el diseño de un lenguaje de anotaciones para el lenguaje de programación Merlín. En concreto, las anotaciones se prevén en forma de especificaciones ecuacionales ...
    • Anotaciones de pruebas de métodos de extracción de Sky View Factor de imágenes ojo de pez con visual a 360° mediante ArcGIS y Rayman 

      García Haro, Alan (2018-11-15)
      Report de recerca
      Accés obert
      Este documento presenta los resultados de un ejercicio comparativo de los métodos de extracción del Sky View Factor de fotografías de ojo de pez a 360°, con herramientas de ArcGIS y Rayman. Los resultados representan la ...
    • Anotaciones sobre la disponibilidad de descarga de imágenes térmicas nocturnas de satélites Landsat para la ciudad de Barcelona 

      García Haro, Alan (2019-06-12)
      Report de recerca
      Accés obert
      El presente documento contiene un breve resumen sobre la disponibilidad de imágenes térmicas nocturnas de Landsat para el área de Barcelona. El objetivo de este documento es presentar, en síntesis, la posibilidad de análisis ...
    • Anotación automática de personas en programas de TV sin supervisión 

      Molina Torrell, Joshua (Universitat Politècnica de Catalunya, 2018-05-30)
      Treball Final de Grau
      Accés obert
    • Another fully abstract graph semantics for the ambient calculus 

      Mylonakis Pascual, Nicolás; Orejas Valdés, Fernando (2007-06)
      Report de recerca
      Accés obert
      The long-term aim of this work is the definition of a framework for the modelling and development of distributed mobile component-based applications. As a first step we provide a fully abstract graph semantics for the ...
    • Another look at principal curves and surfaces 

      Delicado Useros, Pedro Francisco (2001-03)
      Article
      Accés obert
      Principal curves have been defined as smooth curves passing through the “middle” of a multidimensional data set. They are nonlinear generalizations of the first principal component, a characterization of which is the basis ...