Recursos de colección

Archivo Digital UPM (107.543 recursos)

This is an institutional repository providing access to the research output of the institution. Primarily contains thesis.

Tipo de documento = Artículo

Mostrando recursos 1 - 20 de 7.874

  1. Cidade e Habitação na América Latina

    Sambricio, Carlos; Cerasoli, Josianne; Faria, Rodrigo de
    Este Dossiê Cidade e Habitação na América Latina está organizado a partir dos trabalhos apresentados (em Conferências e Sessões Temáticas) no III Congresso Internacional de História Urbana ocorrido em Brasília no mês de novembro de 2013 e organizado pelo Grupo de Pesquisa em História do Urbanismo e da Cidade (GPHUC-UnB/CNPq) e pelo Centro Interdisciplinar de Estudos da Cidade do IFCH-UNICAMP.

  2. Modernidad y arquitectura. Una idea alternativa de modernidad en el arte moderno

    Cortés, Juan Antonio
    Modernidad y arquitectura. Una idea alternativa de modernidad en el arte moderno

  3. Passive neutron area monitor with TLD pairs

    Guzmán-García, Karen Arlete; Borja Hernández, C.G.; Valero Luna, C.; Hernández Dávila, V.M.; Vega-Carrillo, Héctor René
    The response of a passive neutron area monitor with pairs of thermoluminescent dosimeters has been calculated using the Monte Carlo code MCNP5. The response was calculated for one TLD 600 located at the center of a polyethylene moderator. The response was calculated for 47 monoenergetic neutron sources ranging from 1E(-9) to 20 MeV. Response was calculated using two irradiation geometries, one with an upper source and another with a lateral source. For both irradiation schemes the response was calculated with the TLD in two positions, one parallel to the source and another perpendicular to the source. The advantage of this passive...

  4. Non-cooperative identification of civil aircraft using a generalised mutual subspace method

    López Rodríguez, Patricia; Escot Bocanegra, David; Fernández Recio, Raúl; Bravo Muñoz, Ignacio
    The subspace-based methods are effectively applied to classify sets of feature vectors by modelling them as subspaces. However, their application to the field of non-cooperative target identification of flying aircraft is barely seen in the literature. In these methods, setting the subspace dimensionality is always an issue. Here, it is demonstrated that a modified mutual subspace method, which uses softweights to set the importance of each subspace basis, is a promising classifier for identifying sets of range profiles coming from real in-flight targets with no need to set the subspace dimensionality in advance. The assembly of a recognition database is also...

  5. SensoTrust: trustworthy domains in wireless sensor networks

    Castillejo Parrilla, Pedro; Martínez Ortega, José Fernán; López Santidrián, M. Lourdes; Sánchez Alcón, José Antonio
    Wireless sensor networks (WSNs) based on wearable devices are being used in a growing variety of applications, many of them with strict privacy requirements: medical, surveillance, e-Health, and so forth. Since private data is being shared (physiological measures, medical records, etc.), implementing security mechanisms in these networks has become a major challenge. The objective of deploying a trustworthy domain is achieving a nonspecific security mechanism that can be used in a plethora of network topologies and with heterogeneous application requirements. Another very important challenge is resilience. In fact, if a stand-alone and self-configuring WSN is required, an autosetup mechanism is...

  6. La autonomía del contorno en las casas de Sir Edwin Lutyens = The autonomy of contour in the houses by Sir Edwin Lutyens

    Cortés, Juan Antonio
    La autonomía del contorno en las casas de Sir Edwin Lutyens = The autonomy of contour in the houses by Sir Edwin Lutyens

  7. De nuevo los cincuenta. Niemeyer y Bunschaft, premiados

    Cortés, Juan Antonio
    De nuevo los cincuenta. Niemeyer y Bunschaft, premiados

  8. El árbol y el tapiz. Georges Candilis, 1913-1995

    Cortés, Juan Antonio
    El árbol y el tapiz. Georges Candilis, 1913-1995

  9. La disolución del contorno: de Le Corbusier y Terragni a Michael Graves

    Cortés, Juan Antonio
    La disolución del contorno: de Le Corbusier y Terragni a Michael Graves

  10. Releyendo la historia: la arquitectura del racionalismo madrileño

    Cortés, Juan Antonio
    Releyendo la historia: la arquitectura del racionalismo madrileño

  11. Implementation and validation of a self-consumption maximization energy management strategy in a Vanadium Redox Flow BIPV demonstrator

    Fialho, Luis; Fartaria, Tomás; Narvarte Fernández, Luis; Collares Pereira, Manuel
    This paper presents the results of the implementation of a self-consumption maximization strategy tested in a real-scale Vanadium Redox Flow Battery (VRFB) (5 kW, 60 kWh) and Building Integrated Photovoltaics (BIPV) demonstrator (6.74 kWp). The tested energy management strategy aims to maximize the consumption of energy generated by a BIPV system through the usage of a battery. Whenever possible, the residual load is either stored in the battery to be used later or is supplied by the energy stored previously. The strategy was tested over seven days in a real-scale VRF battery to assess the validity of this battery to...

  12. Failure detectors in homonymous distributed systems (with an application to consensus)

    Arévalo Viñuales, Sergio; Jiménez Merino, José Ernesto; Fernández Anta, Antonio; Imbs, Damien; Raynal, Michel
    ABSTRACT This paper is on homonymous distributed systems where processes are prone to crash failures and have no initial knowledge of the system membership (‘‘homonymous’’ means that several processes may have the same identifier). New classes of failure detectors suited to these systems are first defined. Among them, the classes HΩ and HΣ are introduced that are the homonymous counterparts of the Classes Ω and Σ, respectively. (Recall that the pair ⟨Ω, Σ⟩ defines the weakest failure detector to solve consensus.) Then, the paper shows how HΩ and HΣ can be implemented in homonymous systems without membership knowledge (under different synchrony requirements)....

  13. Museum Thyssen im Palacio de Villahermosa, Madrid

    González Capitel, Antón
    Museum Thyssen im Palacio de Villahermosa, Madrid

  14. A New Switching Impulse Generator Based on Transformer Boosting and Insulated Gate Bipolar Transistor Trigger Control

    Ren, Ming; Zhang, Chongxing; Dong, Ming; Ye, Rixin; Albarracin Sanchez, Ricardo
    To make the switching impulse (SI) generator more compact, portable and feasible in field tests, a new approach based on transformer boosting was developed. To address problems such as triggering synchronization and electromagnetic interference involved with the traditional spark gap, an insulated gate bipolar transistor (IGBT) module with drive circuit was employed as the impulse trigger. An optimization design for the component parameters of the primary winding side of the transformer was realized by numerical calculation and error correction. Experiment showed that the waveform parameters of SI and oscillating switching impulse (OSI) voltages generated by the new generator were consistent...

  15. Wind Power Potentials in Cameroon and Nigeria: Lessons from South Africa

    Mas’ud, Abdullahi Abubakar; Wirba, Asan Vernyuy; Ardila-Rey, Jorge Alfredo; Albarracin Sanchez, Ricardo; Muhammad-Sukki, Firdaus; Jaramillo Duque, Álvaro; Bani, Nurul Aini; Munir, Abu Bakar
    Wind energy has seen a tremendous growth for electricity generation worldwide and reached 456 GW by the end of June 2016. According to the World Wind Energy Association, global wind power will reach 500 GW by the end of 2016. Africa is a continent that possesses huge under-utilized wind potentials. Some African countries, e.g., Morocco, Egypt, Tunisia and South Africa, have already adopted wind as an alternative power generation source in their energy mix. Among these countries, South Africa has invested heavily in wind energy with operational wind farms supplying up to 26,000 GWh annually to the national grid. However,...

  16. Artificial Neural Network Application for Partial Discharge Recognition: Survey and Future Directions

    Mas’ud, Abdullahi Abubakar; Albarracin Sanchez, Ricardo; Ardila-Rey, Jorge Alfredo; Muhammad-Sukki, Firdaus; Illias, Hazlee Azil; Bani, Nurul Aini; Munir, Abu Bakar
    In order to investigate how artificial neural networks (ANNs) have been applied for partial discharge (PD) pattern recognition, this paper reviews recent progress made on ANN development for PD classification by a literature survey. Contributions from several authors have been presented and discussed. High recognition rate has been recorded for several PD faults, but there are still many factors that hinder correct recognition of PD by the ANN, such as high-amplitude noise or wide spectral content typical from industrial environments, trial and error approaches in determining an optimum ANN, multiple PD sources acting simultaneously, lack of comprehensive and up to...

  17. Los desplazamientos de Álvaro Siza. Un comentario sobre tres edificios: la casa Maria Margarida en Arcozelo, la casa Avelino Duarte en Ovar y el Banco Borges & Irmao en Vila do Conde

    Cortés, Juan Antonio
    Los desplazamientos de Álvaro Siza. Un comentario sobre tres edificios: la casa Maria Margarida en Arcozelo, la casa Avelino Duarte en Ovar y el Banco Borges & Irmao en Vila do Conde

  18. La geometría ha muerto, ¡viva la geometría!

    Cortés, Juan Antonio
    La geometría ha muerto, ¡viva la geometría!

  19. Las manos del arquitecto. Una reflexión en torno a la obra de James Stirling

    Cortés, Juan Antonio
    Las manos del arquitecto. Una reflexión en torno a la obra de James Stirling

  20. Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations

    Fan, Wenjun; Kevin, Lwakatare; Rong, Rong
    Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take actions to help the adversary bypass the secure perimeter in front of the information-related resources so that the attacking goals can be completed. Though there are a number of security tools, such as firewalls and intrusion detection systems which are used to protect machines from being attacked, widely accepted mechanism to prevent dupe from fraud is lacking. However, the human element is often the weakest link of an information security chain, especially, in a human-centered environment. In this paper, we reveal that the human psychological...

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.