Mostrando ítems 1-20 de 45

    Simulation as key element for intelligent algorithms' development in complex logistic applications 

    Fuentes Leon, Jonas (Fecha de defensa: 2024-11-08)

    This industrial doctorate research addresses the complexity of real-life systems, such as logistics and supply chains, by bridging the gap between mathematical models and real applications. Traditional models often ...

    Creació i investigació crítica d’interfícies gràfiques d’usuari per a l’edició audiovisual 

    Berga Carreras, Quelic (Fecha de defensa: 2024-04-19)

    Aquesta tesi examina la interacció persona-ordinador (IPO) des d’una perspectiva humanística, amb un enfocament en les interfícies d’edició audiovisual. Investiga com aquestes interfícies influeixen i són modelades per les ...

    Engineering data-sharing practices for a fair and trustworthy AI 

    Giner Miguelez, Joan (Fecha de defensa: 2024-07-15)

    Machine learning (ML) technology may discriminate toward specific social groups. For example, recent research have revealed that ML applications are more likely to fail in identifying women than males in hospitals. Recent ...

    Contributions to explainable deep learning models 

    Adhane, Gereziher (Fecha de defensa: 2024-07-10)

    En este trabajo, proponemos técnicas para mejorar el rendimiento y la transparencia de las redes neuronales convolucionales (CNN). Introducimos métodos novedosos para la selección de muestras informativas (ISS), la ...

    Integrating energy harvesting within the IoT ecosystem for sustainable wireless communication 

    Famitafreshi, Golshan (Fecha de defensa: 2024-06-26)

    This dissertation addresses the challenges posed by the energy demands of IoT devices, highlighting the limitations of conventional batteries, which lead to high maintenance costs and environmental concerns. It proposes ...

    On the detection of multi-channel man-in-the-middle attacks against Wi-Fi networks 

    Thankappan, Manesh (Fecha de defensa: 2024-07-09)

    One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which manipulates encrypted wireless frames between clients and the Access Point (AP) in a WLAN. Key reinstallation attacks ...

    A Framework for computer-generated exercises: Learning geometric transformations in computer graphics education 

    González Campos, José Saúl (Fecha de defensa: 2024-05-31)

    This thesis addresses the challenges of teaching geometric transformations, particularly in higher education and computer graphics. It underscores the need for engaging educational resources tailored to the complexities ...

    Motion-based feature analysis for the design of full-body interactions in the context of computer vision and large volume spaces 

    Escamilla Pinilla, Antonio (Fecha de defensa: 2024-04-16)

    Human-computer interaction (HCI) is evolving towards more natural, social, and user-centered interactions, specifically focusing on the use of the entire body as an interface. Full-body interaction involves capturing and ...

    Engaging learners and facilitating teachers in practice-based learning 

    Iftikhar, Sidra (Fecha de defensa: 2024-03-25)

    This research provides an in-depth understanding of student engagement and its indicators for practice-based learning contexts, specifically for the tools. The analysis of engagement in educational contexts is the basis ...

    Visualizar planes de estudios para ver competencias, crear visualizaciones para generar preguntas 

    Blasco-Soplon, Laia (Fecha de defensa: 2023-12-15)

    Esta tesis explora de manera crítica la implantación del espacio europeo de educación superior (EEES) en España desde 2013 hasta 2023, subrayando la falta de visibilidad de las competencias en los planes de estudios. La ...

    Modeling of emotional subjectivity in affective-based predictive systems 

    Hayat, Hassan (Fecha de defensa: 2023-04-19)

    One of the goals of affective computing is to develop affective technologies that can understand humans emotionally and make their life better. Human emotions are highly subjective in nature. This is why systems that ...

    Guided requirements engineering using feature oriented software modeling 

    Sreekumar, Anjali (Fecha de defensa: 2023-05-23)

    A well-defined software requirements specification uniquely describes a functionality or part of a functionality of the software product and is consistent with the definitions and descriptions of the other functionalities ...

    Predictive maintenance of industrial water cooling systems 

    Galve Ceamanos, Sergio (Fecha de defensa: 2022-11-21)

    Working in the practical environment of the LAUDA Ultracool company, this project worked with industrial refrigeration equipment to detect and diagnose failures before they impact the efficiency of the machine. Once the ...

    Desenvolupant un mètode per a la detecció de les potencialitats educatives dels videojocs comercials 

    Adell, Ferran (Fecha de defensa: 2023-03-22)

    L'ús dels videojocs en l'educació ha passat per diferents etapes. En un primer moment, els extrems s'apoderaren de les opinions sobre l'aprenentatge basat en videojocs (VGBL, per la sigla en anglès), i generaven passió o ...

    Leveraging mobile phone-based technologies to provide on-demand adolescent sexual reproductive health information in a resource-limited setting: Kibra, Nairobi County 

    macharia, paul (Fecha de defensa: 2022-12-13)

    Adolescents transitioning from childhood to adulthood need to be equipped with reproductive health (SRH) knowledge, skills, attitudes, and values that empower them. The prevalence of pregnancy and STIs among adolescents ...

    Applications of biased randomised algorithms and simheuristics to asset and liability management 

    Nieto Ranero, Armando Miguel (Fecha de defensa: 2022-07-22)

    Asset and Liability Management (ALM) has captured the attention of academics and financial researchers over the last few decades. On the one hand, we need to try to maximise our wealth by taking advantage of the financial ...

    Forensic imaging and analysis of Apple iOS devices 

    Gomez-Miralles, Luis (Fecha de defensa: 2016-07-26)

    In this thesis we present our research on digital forensics on the iOS platform, structured along three areas: forensic imaging; forensic analysis; and anti-forensic techniques. In the field of forensic imaging, we demonstrate ...

    Optimizing transportation systems and logistics network configurations: from biased-randomized algorithms to fuzzy simheuristics 

    Tordecilla Madera, Rafael David (Fecha de defensa: 2022-02-23)

    Transportation and logistics (T&L) are currently highly relevant functions in any competitive industry. Locating facilities or distributing goods to hundreds or thousands of customers are activities with a high degree of ...

    IoT@run-time: a model-based approach to support deployment and self-adaptations in IoT systems 

    Alfonso, Ivan (Fecha de defensa: 2022-12-05)

    Today, most Internet of Things (IoT) systems leverage edge and fog computing to meet increasingly restrictive requirements and improve quality of service (QoS). Although these multi-layer architectures can improve system ...

    Image steganalysis and steganography in the spatial domain 

    Lerch-Hostalot, Daniel (Fecha de defensa: 2017-04-23)

    In this dissertation, we propose different novel techniques both to detect hidden information (steganalysis) and to hide information (steganography). These techniques are presented in the form of a collection of five ...