Doctorat de Tecnologies de la Informació i de Xarxes

La UOC és una universitat innovadora, arrelada a Catalunya i oberta al món, que forma les persones al llarg de la vida contribuint al seu progrés i al de la societat, alhora que duu a terme recerca sobre la societat del coneixement. El seu model educatiu es basa en la personalització i l'acompanyament de l'estudiant mitjançant l'e-learning.

L'activitat de recerca, innovació; i transferència de la UOC està desenvolupada per més de 400 investigadors i s'organitza en 43 grups d'R+I vinculats a un estudi o a un dels dos centres de recerca de la Universitat: l'IN3 i l'eLearn Center. Entre aquests, 26 grups han estat reconeguts per la Generalitat de Catalunya en la darrera convocatòria del 2014.

L'Escola de Doctorat és una entitat de coordinació i organització dels estudis de doctorat de la Universitat Oberta de Catalunya (UOC) i crea un marc comú de referència per als diferents programes de doctorat que s'hi ofereixen.


Si ets doctor o doctora de la Universitat Oberta de Catalunya i vols publicar la teva tesi a TDX, contacta amb tdx@uoc.edu. Per a més informació consulta les preguntes més freqüents.

Enviaments recents

Simulation as key element for intelligent algorithms' development in complex logistic applications 

Fuentes Leon, Jonas (Data de defensa: 2024-11-08)

This industrial doctorate research addresses the complexity of real-life systems, such as logistics and supply chains, by bridging the gap between mathematical models and real applications. Traditional models often ...

Creació i investigació crítica d’interfícies gràfiques d’usuari per a l’edició audiovisual 

Berga Carreras, Quelic (Data de defensa: 2024-04-19)

Aquesta tesi examina la interacció persona-ordinador (IPO) des d’una perspectiva humanística, amb un enfocament en les interfícies d’edició audiovisual. Investiga com aquestes interfícies influeixen i són modelades per les ...

Engineering data-sharing practices for a fair and trustworthy AI 

Giner Miguelez, Joan (Data de defensa: 2024-07-15)

Machine learning (ML) technology may discriminate toward specific social groups. For example, recent research have revealed that ML applications are more likely to fail in identifying women than males in hospitals. Recent ...

Contributions to explainable deep learning models 

Adhane, Gereziher (Data de defensa: 2024-07-10)

En este trabajo, proponemos técnicas para mejorar el rendimiento y la transparencia de las redes neuronales convolucionales (CNN). Introducimos métodos novedosos para la selección de muestras informativas (ISS), la ...

Integrating energy harvesting within the IoT ecosystem for sustainable wireless communication 

Famitafreshi, Golshan (Data de defensa: 2024-06-26)

This dissertation addresses the challenges posed by the energy demands of IoT devices, highlighting the limitations of conventional batteries, which lead to high maintenance costs and environmental concerns. It proposes ...

On the detection of multi-channel man-in-the-middle attacks against Wi-Fi networks 

Thankappan, Manesh (Data de defensa: 2024-07-09)

One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which manipulates encrypted wireless frames between clients and the Access Point (AP) in a WLAN. Key reinstallation attacks ...

A Framework for computer-generated exercises: Learning geometric transformations in computer graphics education 

González Campos, José Saúl (Data de defensa: 2024-05-31)

This thesis addresses the challenges of teaching geometric transformations, particularly in higher education and computer graphics. It underscores the need for engaging educational resources tailored to the complexities ...

Motion-based feature analysis for the design of full-body interactions in the context of computer vision and large volume spaces 

Escamilla Pinilla, Antonio (Data de defensa: 2024-04-16)

Human-computer interaction (HCI) is evolving towards more natural, social, and user-centered interactions, specifically focusing on the use of the entire body as an interface. Full-body interaction involves capturing and ...

Engaging learners and facilitating teachers in practice-based learning 

Iftikhar, Sidra (Data de defensa: 2024-03-25)

This research provides an in-depth understanding of student engagement and its indicators for practice-based learning contexts, specifically for the tools. The analysis of engagement in educational contexts is the basis ...

Visualizar planes de estudios para ver competencias, crear visualizaciones para generar preguntas 

Blasco-Soplon, Laia (Data de defensa: 2023-12-15)

Esta tesis explora de manera crítica la implantación del espacio europeo de educación superior (EEES) en España desde 2013 hasta 2023, subrayando la falta de visibilidad de las competencias en los planes de estudios. La ...

Modeling of emotional subjectivity in affective-based predictive systems 

Hayat, Hassan (Data de defensa: 2023-04-19)

One of the goals of affective computing is to develop affective technologies that can understand humans emotionally and make their life better. Human emotions are highly subjective in nature. This is why systems that ...

Guided requirements engineering using feature oriented software modeling 

Sreekumar, Anjali (Data de defensa: 2023-05-23)

A well-defined software requirements specification uniquely describes a functionality or part of a functionality of the software product and is consistent with the definitions and descriptions of the other functionalities ...

Predictive maintenance of industrial water cooling systems 

Galve Ceamanos, Sergio (Data de defensa: 2022-11-21)

Working in the practical environment of the LAUDA Ultracool company, this project worked with industrial refrigeration equipment to detect and diagnose failures before they impact the efficiency of the machine. Once the ...

Desenvolupant un mètode per a la detecció de les potencialitats educatives dels videojocs comercials 

Adell, Ferran (Data de defensa: 2023-03-22)

L'ús dels videojocs en l'educació ha passat per diferents etapes. En un primer moment, els extrems s'apoderaren de les opinions sobre l'aprenentatge basat en videojocs (VGBL, per la sigla en anglès), i generaven passió o ...

Leveraging mobile phone-based technologies to provide on-demand adolescent sexual reproductive health information in a resource-limited setting: Kibra, Nairobi County 

macharia, paul (Data de defensa: 2022-12-13)

Adolescents transitioning from childhood to adulthood need to be equipped with reproductive health (SRH) knowledge, skills, attitudes, and values that empower them. The prevalence of pregnancy and STIs among adolescents ...

Applications of biased randomised algorithms and simheuristics to asset and liability management 

Nieto Ranero, Armando Miguel (Data de defensa: 2022-07-22)

Asset and Liability Management (ALM) has captured the attention of academics and financial researchers over the last few decades. On the one hand, we need to try to maximise our wealth by taking advantage of the financial ...

Forensic imaging and analysis of Apple iOS devices 

Gomez-Miralles, Luis (Data de defensa: 2016-07-26)

In this thesis we present our research on digital forensics on the iOS platform, structured along three areas: forensic imaging; forensic analysis; and anti-forensic techniques. In the field of forensic imaging, we demonstrate ...

Optimizing transportation systems and logistics network configurations: from biased-randomized algorithms to fuzzy simheuristics 

Tordecilla Madera, Rafael David (Data de defensa: 2022-02-23)

Transportation and logistics (T&L) are currently highly relevant functions in any competitive industry. Locating facilities or distributing goods to hundreds or thousands of customers are activities with a high degree of ...

IoT@run-time: a model-based approach to support deployment and self-adaptations in IoT systems 

Alfonso, Ivan (Data de defensa: 2022-12-05)

Today, most Internet of Things (IoT) systems leverage edge and fog computing to meet increasingly restrictive requirements and improve quality of service (QoS). Although these multi-layer architectures can improve system ...

Image steganalysis and steganography in the spatial domain 

Lerch-Hostalot, Daniel (Data de defensa: 2017-04-23)

In this dissertation, we propose different novel techniques both to detect hidden information (steganalysis) and to hide information (steganography). These techniques are presented in the form of a collection of five ...

Més