scispace - formally typeset
Search or ask a question
Institution

Polytechnic University of Catalonia

EducationBarcelona, Spain
About: Polytechnic University of Catalonia is a education organization based out in Barcelona, Spain. It is known for research contribution in the topics: Finite element method & Population. The organization has 16006 authors who have published 45325 publications receiving 949306 citations. The organization is also known as: UPC - BarcelonaTECH & Technical University of Catalonia.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors compared several alternative stress state variables in unsaturated soils, with a special focus on the use of an effective stress, and suggested that the proportion of suction contributing to the effective stress is often much smaller than predicted by the term "suction times degree of saturation" generally used in effective stress expressions of the Bishop type.
Abstract: Current alternative choices of stress state variables in unsaturated soils are described and compared, with a special focus on the use of an effective stress. Experimental data on stiffness and shear strength evolution with suction suggest that the proportion of suction contributing to the effective stress is often much smaller than predicted by the term ‘suction times degree of saturation' generally used in effective stress expressions of the Bishop type. It is suggested that effective stress in unsaturated soils should be related to soil microstructure. An effective degree of saturation is defined as describing the volume of water partially filling the soil macroporosity. This effective degree of saturation defines the proportion of the prevailing suction that actually contributes to the effective stress. Two alternative expressions (piecewise linear and non-linear) are proposed for the effective degree of saturation. They offer a similar performance. Available data on stiffness and shear strength varia...

320 citations

Journal ArticleDOI
TL;DR: In this paper, the authors discuss the mixed (class II) scheme used to transport intermediate-and high-energy electrons and positrons and, in particular, the approximations adopted to account for the energy dependence of the interaction cross-sections.
Abstract: The physical algorithms implemented in the latest release of the general-purpose Monte Carlo code penelope for the simulation of coupled electron–photon transport are briefly described. We discuss the mixed (class II) scheme used to transport intermediate- and high-energy electrons and positrons and, in particular, the approximations adopted to account for the energy dependence of the interaction cross-sections. The reliability of the simulation code, i.e. of the adopted interaction models and tracking algorithms, is analyzed by means of a comprehensive comparison of simulation results with experimental data available from the literature. The present analysis demonstrates that penelope yields a consistent description of electron transport processes in the energy range from a few keV up to about 1 GeV.

319 citations

Proceedings Article
01 Jan 2004
TL;DR: The specification and goal of the task are introduced, the data sets and evaluation methods are described, and a general overview of the systems that have contributed to the task is presented, providing comparative description.
Abstract: In this paper we describe the CoNLL-2004 shared task: semantic role labeling. We introduce the specification and goal of the task, describe the data sets and evaluation methods, and present a general overview of the systems that have contributed to the task, providing comparative description.

318 citations

Journal ArticleDOI
TL;DR: An overview of the potential, recent advances, and challenges of optical security and encryption using free space optics is presented, highlighting the need for more specialized hardware and image processing algorithms.
Abstract: Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Perez-Cabre], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.

317 citations

Journal ArticleDOI
TL;DR: An energy management system (EMS) aiming at optimizing the SG's operation, which behaves as a sort of aggregator of distributed energy resources allowing the SG to participate in the open market and improve the grid resilience and flexibility.
Abstract: The integration of renewable energy systems (RESs) in smart grids (SGs) is a challenging task, mainly due to the intermittent and unpredictable nature of the sources, typically wind or sun. Another issue concerns the way to support the consumers' participation in the electricity market aiming at minimizing the costs of the global energy consumption. This paper proposes an energy management system (EMS) aiming at optimizing the SG's operation. The EMS behaves as a sort of aggregator of distributed energy resources allowing the SG to participate in the open market. By integrating demand side management (DSM) and active management schemes (AMS), it allows a better exploitation of renewable energy sources and a reduction of the customers' energy consumption costs with both economic and environmental benefits. It can also improve the grid resilience and flexibility through the active participation of distribution system operators (DSOs) and electricity supply/demand that, according to their preferences and costs, respond to real-time price signals using market processes. The efficiency of the proposed EMS is verified on a 23-bus 11-kV distribution network.

317 citations


Authors

Showing all 16211 results

NameH-indexPapersCitations
Frede Blaabjerg1472161112017
Carlos M. Duarte132117386672
Ian F. Akyildiz11761299653
Josep M. Guerrero110119760890
David S. Wishart10852376652
O. C. Zienkiewicz10745571204
Maciej Lewenstein10493147362
Jordi Rello10369435994
Anil Kumar99212464825
Surendra P. Shah9971032832
Liang Wang98171845600
Aharon Gedanken9686138974
María Vallet-Regí9571141641
Bonaventura Clotet9478439004
Roberto Elosua9048154019
Network Information
Related Institutions (5)
Delft University of Technology
94.4K papers, 2.7M citations

94% related

École Polytechnique Fédérale de Lausanne
98.2K papers, 4.3M citations

94% related

University of Waterloo
93.9K papers, 2.9M citations

94% related

Georgia Institute of Technology
119K papers, 4.6M citations

93% related

Technical University of Denmark
66.3K papers, 2.4M citations

93% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20241
2023129
2022379
20212,313
20202,429
20192,427