Companies and scientists working in areas such as finance or genomics are generating enormously large datasets (in the order of petabytes) commonly referred as Big Data. How to efficiently and effectively process such large amounts of data is an open research problem. Since communication is involved in Big Data processing at many levels, at the NaNoNetworking Center in Catalunya (N3Cat) we are currently investigating the potential role of wireless communications in the Big Data scenario. The main focus of the project is to evaluate the impact of applying wireless communications and networking methods to processors and data centers oriented to the management of Big Data. OBJECTIVES =========== N3Cat is looking for students wanting to work in the area of wireless communications for Big Data. To this end, the candidate will work on one of the following areas: - Traffic analysis of Big Data frameworks and applications, as well as in smaller manycore systems. - Channel characterization in Big Data environments: indoor, within the racks of a data center, within the package of CPU, within a chip. - Design of wireless communication protocols for computing systems from the processor level to the data center level.
Machine Learning (ML) has taken the world by storm and has become a fundamental pillar of engineering. As a result, the last decade has witnessed an explosive growth in the use of deep neural networks (DNNs) in pursuit of exploiting the advantages of ML in virtually every aspect of our lives: computer vision, natural language processing, medicine or economics are just a few examples. However, NOT all DNNs fit to all problems: convolutional NNs are good for computer vision, recurrent NNs are good for temporal analysis, and so on. In this context, the main focus of N3Cat and BNN-UPC is to explore the possibilities of the new and less explored variant called Graph Neural Networks (GNNs), whose aim is to learn and model graph-structured data. This has huge implications in fields such as quantum chemistry, computer networks, or social networks among others. OBJECTIVES =========== N3Cat and BNN-UPC are looking for students wanting to work in the area of Graph Neural Networks studying their uses, processing architectures, and algorithms. To this end, the candidate will work on ONE of the following areas: - Investigating the state of the art on this area, surveying the different works done in terms of applications, processing frameworks, algorithms, benchmarks, datasets. This can be taken from a hardware or software perspective. - Helping to build a testbed formed by a cluster of GPUs that will be running pyTorch or Tensorflow. We will instrument the testbed to measure the computation workload and communication flows between GPUs. - Analyzing the communication workload of running a GNN either in the testbed or by means of architectural simulations. - Developing means of accelerating GNN processing in software (e.g., improving scheduling of the message passing) or hardware (e.g. designing a domain-specific architecture).
Robotic Process Automation is receiving significant attention, due to the promise of improving the performance of the main processes of an organization by incorporating robots that partially perform repetitive tasks. In this project, we will consider how Process Mining can help into finding opportunities to apply Robotic Process Automation for a real case study.
Recently, one of the leaders in Robotic Process Automation has adquired one of the main process mining tools (https://www.uipath.com/newsroom/uipath-acquires-process-gold-unparalleled-process-understanding). This is a confirmation of the potential link between the field of process mining and the field of robotic process automation.
In this project we will try to find out how strong is this link. By using real data from a company that is in trying to automate its processes, the student will dig into the field of process mining to propose a methodology to unleash the application of RPA.
In this project, there is a possibility to have a grant that covers the time invested.
Aquesta beca es per treballar en el contexte d'un projecte de recerca. Es tracta d'implementar un algorisme d'optimització i veure si pot ser competitiu per resoldre problemes de "diseny computacional de proteines" (https://www.nature.com/articles/d41586-019-02251-x). En concret l'algorisme ha de servir per minimitzar la funció d'energia del diseny. L'algorisme que s'ha d'implementar es conegut, pero no s'ha provat mai en aquest problema i segurament la implementació s'haurà d'especialitzar una mica per millorar la seva eficiencia. La beca es pot estendre fins a un any
Es vol desenvolupar un conjunt de components web, usant HTML5 i WebGL, que permetin i facilitin la comprensió dels conceptes de Gràfics per Computador. Aquests components tenen l'objectiu de ser utilitzats per a la docència de les assignatures relacionades amb Gràfics que s'imparteixen a la Facultat.
La situació d'emergència climàtica que estem vivint implica el desenvolupament d'un seguit d'accions multi i transdisciplinars que intentaran mitigar els efectes negatius de la modificació dels patrons climàtics. El projecte, desenvolupat en el marc del grup de treball d'emergència climàtica de la UPC per edificació, busca mitigar aquests efectes en l'àmbit de l'edificació.
El consum energètic en edificació representa més d'un 40% del total i, sabem que els edificis actualment no estan preparats per situacions de manca d'energia o de climatologia adversa.
Si a això se li afegeix els canvis en l'ús dels edificis (teletreball, canvis en la mobilitat amb vehicles que es carreguen a casa, etc.), cal començar a repensar tot el part edificat per buscar mecanismes de millora.
El projecte, que es desenvolupa amb altres estudiants de titulacions diferents (arquitectura, urbanisme, etc), cerca definir un model comú per poder detallar les accions a emprendre. El model, de simulació, ha de permetre establir les bases de comunicació per tal de poder implementar una solució informàtica que permeti optimitzar l'ús o la definició d'un edifici.
El projecte no parteix de zero i es basa en la tasca feta a través del projecte NECADA (https://necada.com)
The aim of the project is to study the properties of quantum particles in an external field reproducing a fractal structure. A possible realization is an ultracold quantum gas confined to two dimensions with a superimposed external field, which will create the fractal geometry. As a model for the fractal, we will consider Sierpi¿ski carpet. The main properties of interest in the ground state energy and the density profile. Such properties are to be calculated as a function of the recursion number and a possible existence of a simple scaling law has to be verified.
This interdisciplinary problem is based on application of mathematical concepts to the field of quantum physics and relies on use of numerical methods. This project requires carrying out a scientific investigation and a priori it is not clear which method will work the best. In particular, possible approaches to address the problem are
1) to solve Schrödinger equation in imaginary time for one particle
2) to solve Gross-Pitaevskii equation to solve Schroedinger equation in imaginary time for many bosons
3) do exact diagonalization of a discretized Hamiltonian for one particle and few fermions
4) random walks solution for the diffusion equation (i.e. Schroedinger equation in imaginary time) for one particle
 Simulating the 1D GPE http://link.springer.com/content/pdf/bbm%3A978-3-319-42476-7%2F1.pdf
 Solving Hydrogen atom numerically with 14 lines of Matlab code https://timqian.com/2015/03/04/H-atom-numerical/
Web tracking technologies are extensively used to collect large amounts of personal information (PI), including the things we search, the sites we visit, the people we contact, or the products we buy. Although it is commonly believed that this data is mainly used for targeted advertising, some recent works revealed that it is exploited for many other purposes, such price discrimination, financial credibility, insurance coverage, government surveillance, background scanning or identity theft. The main objective of this project is to apply network traffic monitoring and analysis technologies to uncover the particular methods used to track Internet users and collect PI. This project will be useful for both Internet users and the research community, and will produce open source tools, real data sets, and publications revealing most privacy attempting practices. Some preliminary results of our work in this area were recently published in Proceedings of the IEEE (IF: 9.237) and featured in a Wall Street Journal article.
More info at:
The main goal of this project is to develop a network monitoring system that can be used by network operators to detect bitcoin miners (or miners from other blockchain technologies) in their network. The system will rely only on network measurements obtained by standard network measurement tools and estimate interesting characteristics of detected miners, such as power consumption. How to apply: Please send an email to with your CV and academic file (pdf can be generated from the Raco).
The identification of the applications behind the network traffic (i.e. traffic classification) is crucial for ISPs and network operators to better manage and control their networks. However, the increasing use of encryption and web-based applications makes this identification very challenging. This problem is exacerbated with the widespread deployment of content distribution networks (e.g. Akamai) and cloud-based services (e.g. Amazon AWS). The goal of this project is to develop a traffic monitoring tool to accurately identify web services from HTTPS traffic, including Google, YouTube, Facebook, Twitter among others. The tool will combine the information from IP addresses and DNS, with novel classification methods inspired on the Google PageRank algorithm to identify encrypted traffic, even if served from Akamai, AWS or Google infrastructures. This project will be carried out in collaboration with the tech-based company Talaia Networks (https://www.talaia.io), which develops cloud-based network monitoring solutions.
How to apply: Please send an email to email@example.com with your CV and academic file (pdf can be generated from the Raco).
One of the unusual effects observed in non-linear optics is a self-focusing leading to creation of stable propagating wave in a shape of a soliton. A similar state, known as a bright soliton, can be created in ultracold atomic gases in a tight waveguide for attractive interaction between bosons. Such states are commonly described within the mean-field theory in terms of a one-dimensional non-linear Gross-Pitaevskii equation. This equation permits an explicit solution for the bright soliton which is applicable when the interactions between particles are weak. For arbitrary interaction strength there is an exact solution by McGuire describing a one-dimensional system with a contact interaction. Nevertheless, a full description of the soliton as a three-dimensional object confined to a waveguide is still missing. This project aims at providing a full three-dimensional description of a bright soliton in a waveguide by means of Variational and Diffusion Monte Carlo methods.
One of the unusual effects observed in non-linear optics is a self-focusing leading to creation of stable propagating wave in a shape of a soliton. A similar state, known as a bright soliton, can be created in ultracold atomic gases in a tight waveguide for attractive interaction between bosons. Such states are commonly described within the mean-field theory in terms of a one-dimensional non-linear Gross-Pitaevskii equation. This equation permits an explicit solution for the bright soliton which is applicable when the interactions between particles are weak[2,3]. For arbitrary interaction strength there is an exact solution by McGuire describing a one-dimensional system with a contact interaction[4,5]. Nevertheless, a full description of the soliton as a three-dimensional object confined to a waveguide is still missing. This project aims at providing a full three-dimensional description of a bright soliton in a waveguide by means of Variational and Diffusion Monte Carlo methods.
During the project it will be necessary to develop a code (preferably in c programming language), test it and perform simulations of the soliton in quasi-one-dimensional geometry. In case of a positive outcome, a scientific publication will be prepared.
 V. E. Zakharov, A. B. Shabat "Integration of nonlinear equations of mathematical physics by the method of inverse scattering II" Funktsional. Anal. i Prilozhen., 13, 13 (1979)
 L. Salasnich "Bright solitons in ultracold atoms" Optical and Quantum Electronics, 49, 409 (2017)
 J. B. McGuire "Study of Exactly Soluble One-Dimensional N-Body Problems" J. Math. Phys. 5, 622 (1964)
 F. Calogero, A. Degasperis "Comparison between the exact and Hartree solutions of a one-dimensional many-body problem" Phys. Rev. A 11, 265 (1975)
 G. E. Astrakharchik and S. Giorgini, "Correlation functions and momentum distribution of one-dimensional Bose systems",
hys. Rev. A 68, 031602(R) (2003)
UPC is offering a new position to develop the TFG/TFM in the field of Machine Learning and Cybersecurity. This TFM will be fully funded (internship) and carried out in collaboration with the Global Security Operations Center of Nestlé and UPC.
Cybersecurity is becoming an increasingly important challenge for all companies and individuals alike. While big names used to be the main targets in the past, as people's lives move online, anyone is nowadays a potential target for any kind of cyber-attack, ranging from phishing to ransomware or serious privacy issues. In order to fight against those ever-evolving threats, Machine Learning is increasingly being used behind the scenes to design better systems that are able of self-learning to boost detection rates and boost overall resilience to unknown attacks. As AI-based solutions penetrate products across the industry, a new kind of threat that is often overlooked is becoming more and more prominent and dangerous: adversarial machine learning (AML).
AML focuses on designing specific inputs to deceive a previously trained Machine Learning models into misclassifying them for a specific purpose. One of the main flaws of any state-of-the-art Machine Learning or Deep Learning algorithms is that they assume that the nature of the data they receive is systematically benign, which is generally the case but does not hold true when an adversarial input is received. The motivation behind altering a ML model into thinking that, for example, a new sample is benign when in fact is malicious can range from pure research to more serious real-life issues such as an autonomous car wrongly classifying a stop sign (and thus provoking a fatal accident) or a wrongly diagnosed disease because of a slightly manipulated magnetic resonance image.
This problem is no exception for Cybersecurity where companies wrongly assume that once the last AI-based product is deployed in their network, their employees are safe...
In a recent experiment (https://arxiv.org/abs/2002.10475) with ultracold dysprosium atoms, it was possible to realize a dipolar gas in one-dimensional geometry at low temperature. The goal of the project is to provide realistic simulation of such a system. To do so, quantum Monte Carlo code has to be developed.
Variational and Diffusion Monte Carlo codes will be implemented. One-dimensional geometry makes it easier to write the code. In case of a sussesfull simulation of the experiment, a common article with some of the authors of the experiment is possible.