Now showing items 1-20 of 43

    Engineering data-sharing practices for a fair and trustworthy AI 

    Giner Miguelez, Joan (Date of defense: 2024-07-15)

    Machine learning (ML) technology may discriminate toward specific social groups. For example, recent research have revealed that ML applications are more likely to fail in identifying women than males in hospitals. Recent ...

    Contributions to explainable deep learning models 

    Adhane, Gereziher (Date of defense: 2024-07-10)

    En este trabajo, proponemos técnicas para mejorar el rendimiento y la transparencia de las redes neuronales convolucionales (CNN). Introducimos métodos novedosos para la selección de muestras informativas (ISS), la ...

    Integrating energy harvesting within the IoT ecosystem for sustainable wireless communication 

    Famitafreshi, Golshan (Date of defense: 2024-06-26)

    This dissertation addresses the challenges posed by the energy demands of IoT devices, highlighting the limitations of conventional batteries, which lead to high maintenance costs and environmental concerns. It proposes ...

    On the detection of multi-channel man-in-the-middle attacks against Wi-Fi networks 

    Thankappan, Manesh (Date of defense: 2024-07-09)

    One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which manipulates encrypted wireless frames between clients and the Access Point (AP) in a WLAN. Key reinstallation attacks ...

    A Framework for computer-generated exercises: Learning geometric transformations in computer graphics education 

    González Campos, José Saúl (Date of defense: 2024-05-31)

    This thesis addresses the challenges of teaching geometric transformations, particularly in higher education and computer graphics. It underscores the need for engaging educational resources tailored to the complexities ...

    Motion-based feature analysis for the design of full-body interactions in the context of computer vision and large volume spaces 

    Escamilla Pinilla, Antonio (Date of defense: 2024-04-16)

    Human-computer interaction (HCI) is evolving towards more natural, social, and user-centered interactions, specifically focusing on the use of the entire body as an interface. Full-body interaction involves capturing and ...

    Engaging learners and facilitating teachers in practice-based learning 

    Iftikhar, Sidra (Date of defense: 2024-03-25)

    This research provides an in-depth understanding of student engagement and its indicators for practice-based learning contexts, specifically for the tools. The analysis of engagement in educational contexts is the basis ...

    Visualizar planes de estudios para ver competencias, crear visualizaciones para generar preguntas 

    Blasco-Soplon, Laia (Date of defense: 2023-12-15)

    Esta tesis explora de manera crítica la implantación del espacio europeo de educación superior (EEES) en España desde 2013 hasta 2023, subrayando la falta de visibilidad de las competencias en los planes de estudios. La ...

    Modeling of emotional subjectivity in affective-based predictive systems 

    Hayat, Hassan (Date of defense: 2023-04-19)

    One of the goals of affective computing is to develop affective technologies that can understand humans emotionally and make their life better. Human emotions are highly subjective in nature. This is why systems that ...

    Guided requirements engineering using feature oriented software modeling 

    Sreekumar, Anjali (Date of defense: 2023-05-23)

    A well-defined software requirements specification uniquely describes a functionality or part of a functionality of the software product and is consistent with the definitions and descriptions of the other functionalities ...

    Predictive maintenance of industrial water cooling systems 

    Galve Ceamanos, Sergio (Date of defense: 2022-11-21)

    Working in the practical environment of the LAUDA Ultracool company, this project worked with industrial refrigeration equipment to detect and diagnose failures before they impact the efficiency of the machine. Once the ...

    Desenvolupant un mètode per a la detecció de les potencialitats educatives dels videojocs comercials 

    Adell, Ferran (Date of defense: 2023-03-22)

    L'ús dels videojocs en l'educació ha passat per diferents etapes. En un primer moment, els extrems s'apoderaren de les opinions sobre l'aprenentatge basat en videojocs (VGBL, per la sigla en anglès), i generaven passió o ...

    Leveraging mobile phone-based technologies to provide on-demand adolescent sexual reproductive health information in a resource-limited setting: Kibra, Nairobi County 

    macharia, paul (Date of defense: 2022-12-13)

    Adolescents transitioning from childhood to adulthood need to be equipped with reproductive health (SRH) knowledge, skills, attitudes, and values that empower them. The prevalence of pregnancy and STIs among adolescents ...

    Applications of biased randomised algorithms and simheuristics to asset and liability management 

    Nieto Ranero, Armando Miguel (Date of defense: 2022-07-22)

    Asset and Liability Management (ALM) has captured the attention of academics and financial researchers over the last few decades. On the one hand, we need to try to maximise our wealth by taking advantage of the financial ...

    Forensic imaging and analysis of Apple iOS devices 

    Gomez-Miralles, Luis (Date of defense: 2016-07-26)

    In this thesis we present our research on digital forensics on the iOS platform, structured along three areas: forensic imaging; forensic analysis; and anti-forensic techniques. In the field of forensic imaging, we demonstrate ...

    Optimizing transportation systems and logistics network configurations: from biased-randomized algorithms to fuzzy simheuristics 

    Tordecilla Madera, Rafael David (Date of defense: 2022-02-23)

    Transportation and logistics (T&L) are currently highly relevant functions in any competitive industry. Locating facilities or distributing goods to hundreds or thousands of customers are activities with a high degree of ...

    IoT@run-time: a model-based approach to support deployment and self-adaptations in IoT systems 

    Alfonso, Ivan (Date of defense: 2022-12-05)

    Today, most Internet of Things (IoT) systems leverage edge and fog computing to meet increasingly restrictive requirements and improve quality of service (QoS). Although these multi-layer architectures can improve system ...

    Image steganalysis and steganography in the spatial domain 

    Lerch-Hostalot, Daniel (Date of defense: 2017-04-23)

    In this dissertation, we propose different novel techniques both to detect hidden information (steganalysis) and to hide information (steganography). These techniques are presented in the form of a collection of five ...

    Enterprise reference architectures for higher education institutions: Analysis, comparison and practical uses 

    Sanchez Puchol, Felix (Date of defense: 2022-04-29)

    Enterprise Architecture (EA) is currently accepted as one on the major instruments for enabling organisations in their transformation processes to achieve business-technology alignment. Despite that over the last years EA ...

    Applications of the Internet of Things and optimization to inventory and distribution management 

    Raba Sánchez, David (Date of defense: 2021-09-17)

    This thesis is part of the IoFEED (EU funded) project, which aims to monitor approximately 325 farm bins and investigates business processes carried out between farmers and animal feed producers. We propose a computer-aided ...