Ara es mostren els items 41-60 de 72

    • Incremental capacity planning in flexgrid optical networks 

      Morales Alcaide, Fernando (Universitat Politècnica de Catalunya, 2015-02)
      Treball Final de Grau
      Accés obert
      Les xarxes de comunicacions de fibra òptica necessiten adaptar-se com a resposta a l'evolució del tràfic de dades que han de transportar. Aquesta evolució inclou l'extensió periòdica de la seva capacitat per tal de millorar ...
    • Informació i codis 

      Brunat Blay, Josep Maria; Ventura Capell, Enric (Edicions UPC, 2001)
      Llibre
      Accés restringit a la comunitat UPC
      La teoria de la comunicació té els orígens a mitjan segle XX i cada vegada té més rellevància científica, tecnològica i social. Aquest llibre és una introducció a la matèria i en tracta els dos aspectes principals, la ...
    • Introducción a los códigos Turbo 

      Calvo Page, Eduard; Ribot Caner, Jaume (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 2003)
      Article
      Accés obert
      El objetivo de este artículo es dar al lector una visión global de los Códigos Turbo a modo de tutoriaI. No pretende introducir ninguna innovación en el campo, sino evitar la tarea de tener que recurrir a muchas fuentes ...
    • Isometries of the hamming space and equivalence relations of linear codes over a finite field 

      García Planas, María Isabel; Magret Planas, Maria dels Dolors (Springer, 2016)
      Capítol de llibre
      Accés restringit per política de l'editorial
      Detection and error capabilities are preserved when applying to a linear code an isomorphism which preserves Hamming distance. We study here two such isomorphisms: permutation isometries and monomial isometries
    • Lattice-based threshold cryptography 

      Alborch Escobar, Ferran (Universitat Politècnica de Catalunya, 2020-07)
      Treball Final de Grau
      Accés obert
      Ever since the appearance of quantum computers, prime factoring and discrete logarithm based cryptography has been put in question, giving birth to the so called post-quantum cryptography. The goal of this bachelor's degree ...
    • Los "Turbo códigos", nuevos subsistemas de codificación de canal para mejorar la transmisión digital de gran capacidad 

      Armengol Roig, Enric; Delgado Penin, José Antonio (Escola Tècnica Superior d'Enginyers de Telecomunicació de Barcelona, 1996)
      Article
      Accés obert
    • Machine Learning Applied to Network Traffic 

      Rodríguez Segado, David (Universitat Politècnica de Catalunya / Universitat de Barcelona, 2019-06)
      Projecte Final de Màster Oficial
      Accés restringit per decisió de l'autor
      Realitzat a/amb:   Starflow Networks
      The appliance of machine learning to TCP/IP traffic flows is not new. However, this projects aims to use it to predict the congestion avoidance algorithm at the first second of a data transference. Being able to recognize ...
    • Machine-to-machine (M2M) communications for e-health applications 

      Kartsakli, Elli; Lalos, Aristeidis; Antonopoulos, Angelos; Tennina, Stefano; Di Renzo, Marco; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos (Elsevier, 2015)
      Capítol de llibre
      Accés obert
      The emerging technology of machine-to-machine (M2M) communications is bringing a paradigm shift in healthcare delivery. A broad range of e-health applications can be conceived, with considerable benefits for both patients ...
    • Mathematical and Technological Aspects of Quantum Information Processing 

      Tura i Brugués, Jordi (Universitat Politècnica de Catalunya, 2011-03)
      Projecte Final de Màster Oficial
      Accés obert
      Since its genesis, quantum mechanics has proved to be a very accurate model for predicting the behavior of the world below the nanoscale. However, crucial breakthroughs in technology were needed in order to be able to e ...
    • Mathematical methods of signal processing 

      Sayols Baixeras, Narcís (Universitat Politècnica de Catalunya, 2011-11)
      Projecte Final de Màster Oficial
      Accés obert
      The aim of this project is to present in a systematic way the more relevant mathematical methods of signal processing, and to explore how they are applied to speech and image precessing. After explaining the more common ...
    • Mixed-signal test band guarding using digitally coded indirect measurements 

      Gómez Pau, Álvaro; Balado Suárez, Luz María; Figueras Pàmies, Joan (Institute of Electrical and Electronics Engineers (IEEE), 2015)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      Testing analog and mixed-signal circuits is a costly task due to the required test time targets and high end technical resources. Indirect testing methods partially address these issues providing an efficient solution using ...
    • Monomial codes seen as invariant subspaces 

      García Planas, María Isabel; Magret Planas, Maria dels Dolors; Um, Laurence Emilie (2017)
      Article
      Accés obert
      It is well known that cyclic codes are very useful because of their applications, since they are not computationally expensive and encoding can be easily implemented. The relationship between cyclic codes and invariant ...
    • Multi-criteria decision making with linguistic labels: a comparison of two methodologies applied to energy planning 

      Afsordegan, Arayeh; Sánchez Soler, Monica; Agell Jané, Núria; Cremades Oliver, Lázaro Vicente; Zahedi, Siamak (2014)
      Text en actes de congrés
      Accés obert
      This paper compares two multi-criteria decision making (MCDM) approaches based on linguistic label assessment. The first approach consists of a modified fuzzy TOPSIS methodology introduced by Kaya and Kahraman in 2011. ...
    • NCMOB-MAC: a network coding-based MAC protocol with mobility support 

      Torres, Pol; Antonopoulos, Angelos; Alonso Zárate, Luis Gonzaga; Schulte, Gerrit (Institute of Electrical and Electronics Engineers (IEEE), 2014)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      In this paper, a novel Network Coding (NC)-aided Medium Access Control (MAC) protocol with mobility support (NCMOB-MAC) is presented. The proposed protocol is compatible with Automatic Repeat reQuest (ARQ) techniques ...
    • Network coding for transport protocols 

      Gheorghiu, Steluta (Universitat Politècnica de Catalunya, 2011-07-11)
      Tesi
      Accés obert
      With the proliferation of smart devices that require Internet connectivity anytime, anywhere, and the recent technological advances that make it possible, current networked systems will have to provide a various range of ...
    • Notes on betweenness centrality of a graph 

      Gago Álvarez, Silvia; Hurajová, Jana; Madaras, Tomas (2009-05-19)
      Report de recerca
      Accés obert
      The betweenness centrality of a vertex of a graph is the portion of shortest paths between all pairs of vertices passing through that vertex. We study selected general properties of this invariant and its relations to ...
    • On fuzzy-qualitative descriptions and entropy 

      Prats Duaygues, Francesc; Roselló Saurí, Llorenç; Sánchez Soler, Monica; Agell Jané, Núria (2016-08-01)
      Article
      Accés obert
      This paper models the assessments of a group of experts when evaluating different magnitudes, features or objects by using linguistic descriptions. A new general representation of linguistic descriptions is provided by ...
    • On ratio and product methods with certain known population parameters of auxiliary variable in sample surveys 

      Singh, Housila. P.; Tailor, Ritesh; Tailor, Rajesh (Institut d'Estadística de Catalunya, 2010)
      Article
      Accés obert
      This paper proposes two ratio and product-type estimators using transformation based on known minimum and maximum values of auxiliary variable. The biases and mean squared errors of the suggested estimators are obtained ...
    • On the information ratio of non-perfect secret sharing schemes 

      Farràs Ventura, Oriol; Hansen, Torben; Kaced, Tarik; Padró Laimon, Carles (2017-12-01)
      Article
      Accés obert
      A secret sharing scheme is non-perfect if some subsets of players that cannot recover the secret value have partial information about it. The information ratio of a secret sharing scheme is the ratio between the maximum ...
    • On the optimization of bipartite secret sharing schemes 

      Farràs Ventura, Oriol; Metcalf-Burton, Jessica Ruth; Padró Laimon, Carles; Vázquez González, Leonor (2012-05-01)
      Article
      Accés obert
      Optimizing the ratio between the maximum length of the shares and the length of the secret value in secret sharing schemes for general access structures is an extremely difficult and long-standing open problem. In this ...