Dissertations / Theses on the topic 'Systèmes de communication sans fil – Innovation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Systèmes de communication sans fil – Innovation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Claudel, Servane. "Processus d'innovation pour la sécurité des données dans les réseaux sans fil : stratégie d'innovation et valorisation : application à un projet dans l'UWB." Besançon, 2003. http://www.theses.fr/2003BESA2037.
Full textIn this report, we will discuss the need to develop a multidimensional strategy that will allow you to move to a planned, staged approach that will increase your chances of success. We will explain about novel, creative approach to manage an early stage project with another look, less technical. This approach is based on our own risk framework for valuing innovative project that will help scientists who want to create a spin off or a start up from their public or private research. The major hurdle facing the entrepreneurs in the 'real' technology innovation arena today, is how to access funds to finance the Early-Stage R&D. Based on our studies of an early stage project in new wireless technology Ultra Wide Band, we explain the impact of standards, of innovation diffusion process, of intangible assets valuation, of R&D issues on the decision making process. Early stage project in new technologies requires seed funds that will help the founders to convert their ideas to a stage that can attract VC funds and then finance the different stages of development before research is stabilized and can be put to production. Our aim is to show the importance of such factors, epecially in early stage innovative project
Haj, Hmida Wafa. "Affectation de pilotes dans la liaison descendante des systèmes de télécommunication sans cellule." Thesis, Limoges, 2020. http://aurore.unilim.fr/theses/nxfile/default/0fd5c3e4-7bba-4783-9a5e-f033b34aa0e9/blobholder:0/2020LIMO0079.pdf.
Full textIn Cell-Free massive Multiple-Input-Multiple-Output (Cell-Free massive MIMO) systems, we distribute in a coverage area a massive number of access points, mastered by central processing units (CPUs), to simultaneously serve much smaller number of user equipments (UEs) over the same time/frequency resources. In contrast to the centralized massive MIMO, cell-free massive MIMO is characterized by a channel hardening not sufficiently accentuated, thus, it will be appropriate to include downlink (DL) pilots to estimate the DL channel. This thesis considers a DL pilot assignment for the cell-free massive MIMO systems by defining a metric, involving the inter-user interference (IUI). This metric gives insights about DL pilot contamination. A threshold is then defined to optimize the number of DL pilots, which maximizes the minimum per-user DL throughput. This approach gives a conflict graph, where each UE is regarded as a vertex of the graph. It consists in a combinatorial optimization problem that can be approximated using a graph coloring algorithm. It is a greedy algorithm whose steps are described as follows. By fixing the adequate threshold, maximizing the minimum per-user DL throughput, a conflict or interference graph is constructed. It models the potential interference among interfering UEs, the UEs between which there is an edge are in conflict, i.e., present a high IUI. Then, the proposed scheme mitigates the potential IUI by appointing different DL pilots to connected UEs with high IUI and same DL pilots to UEs with low IUI in the conflict graph in accordance with some coloring rules. The simulation results validate that the minimum per-user DL throughput based on the proposed approach outperforms the conventional methods, i.e., statistical channel state information, the orthogonal and the random pilot assignment in the DL training. Our analysis underlines also the reduction of the DL pilot overhead ratio using the DL pilot assignment based on our proposed scheme, compared to the conventional methods aforementioned
Khoder, Rami. "Etude de la mobilité et de la qualité de service des communications véhiculaires optiques." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG045.
Full textThe thesis topic is a part of the global interest in wireless vehicular networks. Over the past decade, the number of road accidents has increased quickly with the growth of the automotive sector. Statistics have demonstrated that the high number of accidents on the road is primarily due to the high traffic density and the lack of information about other drivers' decisions. Recent studies have shown the importance of vehicular communications, which allow the exchange of real-time traffic safety information between vehicles and thus contribute to accidents avoidance.Through vehicular communication, known as vehicle-to-everything (V2X), which includes vehicle-to-vehicle (V2V) and vehicle-to-infrastructure, vehicles can exchange road safety and traffic management messages with low latency. Platoon formation is considered an interactive option that can improve V2X communication and ensure more safety. The vehicle platoon is defined as a group of vehicles following each other, moving in a straight line with a very short inter-vehicle space. Several vehicle platoon formation strategies have been defined in order to manage the platoon's lifetime and stability. However, none of these strategies has taken into account traffic congestion and speed constraints.The first objective of our work is to propose a new platoon formation algorithm called speed platoon splitting (SPS) where vehicles are grouped according to their destination (the leading vehicle has the farthest destination and the latest vehicle has the nearest destination). The main purpose of SPS is to target alleviating congestion by using a ticket pool and classify platoons according to their velocity in two different lanes. Performance analysis shows that SPS provides platoon stability and reduces highway congestion.V2X communications can be achieved via radio frequency (RF) technologies, especially the 802.11p standard. However, due to the accelerated growth in the number of devices, this technology suffers from several problems such as high latency and channel congestion. An alternative communication solution is provided by visible light communication (VLC). VLC is the usage of visible light as a wireless data transmission technique. VLC reduces complexity and cost, enables high precision positioning and increases network scalability and security.The second objective of this thesis tackles the performance of VLC in V2V among the platoon members. For this purpose, we considered two mathematical models validated by simulations for two different scenarios (we have taken an M/M/1 and an M/GI/1 queues for the first and the second scenarios respectively). The performance evaluations present a detailed study of the VLC in the presence of disruptive vehicles and they are used to derive computations of the Quality of Service parameters. The main conclusion drawn is that VLC technology is considered an efficient technique but it is affected by disruptive vehicles.The third objective of the thesis focuses on proposing a mechanism for vertical handover (VHO) between VLC and RF technologies. This objective is composed of two parts, the first one is based on the threshold value to make a vertical handover decision or by using machine learning techniques. The second part is to choose the appropriate technology after VHO using the utility function or the cooperative game.Throughout the thesis, the performance evaluation of the VLC is based on mathematical modelling. Moreover, the simulation is performed to validate this mathematical modelling
Mouawad, Mina Rady Abdelshahid. "Agile Multi-PHY Wireless Networking." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS462.
Full textThis thesis contributes to the emerging field of agile multi-PHY wireless networking. Industrial wireless networks have relied on a single physical layer for their operation. One example is the standardized IETF 6TiSCH protocol stack for industrial wireless networking, which uses IEEE~802.15.4 O-QPSK radio in the 2.4~GHz band as its physical layer. Advances in radio chip manufacturing have resulted in chips that support a diverse set of long range and short range PHYs. We use the term "PHY'' to refer to any combination of: modulation, frequency band, and coding scheme. In this research, we argue that combining long-range and short-range PHYs can offer balanced network end-to-end performance that no single PHY achieves. We demonstrate how a set of short-range and long-range PHYs can be integrated under one generalized 6TiSCH ("g6TiSCH'') architecture and we evaluate its performance experimentally in a testbed of 36~motes at Inria-Paris. We further demonstrate, experimentally, how a TSCH slotframe can adapt the slot duration on a slot-by-slot basis, as a function of the bitrate of the used PHY ("6DYN''). Finally, we design and evaluate, through simulation, an objective function for RPL that optimizes for network lifetime ("Life-OF''). We demonstrate how Life-OF combines diverse PHYs to boost network lifetime to be up to 470% compared to the IETF standard MRHOF
Kelif, Jean-Marc. "Modèles fluides de réseaux sans fil." Paris, ENST, 2008. https://pastel.hal.science/pastel-00004761.
Full textSouilmi, Younès. "Communication sans fil utilisant une signalisation ultra large bande." Paris, ENST, 2005. http://www.theses.fr/2005ENST0033.
Full textUWB is a new emerging technology which promises to bring a real revolution in the field of WLAN communications. UWB is based on a shift in spectrum management paradigm which consists on allowing users to transmit over a shared bandwidth of several GHz rather than allocating private bandwidth to each user. No significant interference is caused to other UWB users nor to other systems coexisting on the same frequency bandwidth thanks to a constrain on the transmitted power spectral density. Given the huge bandwidth used by UWB systems, the latter operates in the low spectral efficiency regime. In our work we investigate the impact of UWB characteristics on the design of adequate signalling and coding schemes. Motivated by the fact that channel knowledge is not required to achieve channel capacity for vanishing spectral efficiency, we consider non-coherent type of detection. We first evaluate the performance of practical non-coherent schemes using on-off signalling. We then investigate the impact of channel estimation, made possible by channel stationary, on system performance and show at which extinct practical coherent UWB systems can outperform non-coherent ones. Later we introduce a multi-carrier UWB signalling scheme which generalizes the concept of on-off signalling to the time-frequency 2-dimentional signalling space. We analyze the performance of this signalling scheme by deriving lower and upper bounds on its achievable data rates over the set of all frequency taps correlation profiles. We then consider UWB on-off signalling in the context of peer-to-peer multiple access networks. We propose a quantized threshold-based non-coherent receiver whose performance is shown
Tlais, Mazen. "Architecture sans fil discontinue : problématiques, conception et évaluation." Rennes 1, 2008. ftp://ftp.irisa.fr/techreports/theses/2008/tlais.pdf.
Full textDans le domaine des réseaux mobiles, les progrès en matière de technologie de communication sans fil permettent d'envisager la mise en oeuvre d'applications réclamant des débits importants. Le plus souvent, les utilisateurs sont maintenant équipés de terminaux munis d'interface de communication sans fil et de fonctions de captures numériques (comme un appareil photo par exemple), avec lesquels ils souhaitent pouvoir regarder des films, ou bien encore capturer et stocker des photos et des séquences vidéo. De telles applications peuvent rapidement consommer la bande passante disponible dans l'infrastructure de communication. Dans ce contexte, les débits fournis par les réseaux mobiles actuels, en plus d'être d'un coût élevé, ne sont pas, le plus souvent, suffisants pour servir un grand nombre d'utilisateurs. L'objectif de cette thèse est de proposer et d'évaluer une architecture de réseau mobile offrant un haut débit, et ce pour un faible coût de déploiement. Cette architecture doit permettre à une densité élevée d'utilisateurs d'échanger des quantités importantes de données avec des serveurs applicatifs, et ce sans dégrader la qualité de service. Notre contribution repose sur trois parties. Dans un premier temps, nous proposons une architecture en mesure de fournir des transferts haut débit, pour des faibles coûts de déploiement. Cette architecture s'appuie sur une interconnexion de cellules radio de tailles réduites et n'offrant pas une couverture continue. On parle alors de réseau à couverture discontinue. Dans un deuxième temps, nous validons le fonctionnement de cette architecture pour les flux descendants et montants. Dans un troisième temps, nous décrivons les problèmes posés par un déploiement grande échelle du réseau proposé, et nous présentons des solutions adaptées
Muhammad, Najam ul Islam. "Architectures reconfigurables pour les systèmes sans fil, existants et futurs." Paris, Télécom ParisTech, 2010. http://www.theses.fr/2010ENST0039.
Full textWe present a generic baseband prototype architecture for Software Defined Radio (SDR) applications that anticipates not only fulfilling current UMTS processing requirements but is also proficient enough to handle 3GPP –LTE processing requirements. The hardware is designed in such a manner that it would substantiate the most computation intensive task efficiently i. E. Meeting the throughput and latency requirements. The hardware is flexible enough to employ the same baseband processing resources for multiple standards. The presented configurable architecture takes advantage of the commonalities that exist among the different schemes. The commonalities and disjoints are translated into hardware architecture to come up with a system that performs all the required operations. The end product enables user to perform desired standard by providing the parameters without going into any details of the architecture. The multi-standard designs should have high performance to comply with the throughput and timing constraints of all the standards. To explore the performance criteria in the baseband design, we present specification, design and implementation of hardware blocks using two approaches, Application Specific Integrated Circuit (ASIC) and Application Specific Instruction Processors (ASIP) designs. The ASIP design provides more flexibility and programmability at the cost of some loss in the performance. We also consider the other existing hardware technologies, take into account their specific advantages and drawbacks, and compare those on the basis of computation type categorization in the baseband design to come up with some guidelines for multi-standard baseband design
Nazareth, da Costa Michele. "Codage spatio-temporel tensoriel pour les systèmes de communication sans fil MIMO." Phd thesis, Université Nice Sophia Antipolis, 2014. http://tel.archives-ouvertes.fr/tel-00994113.
Full textCosta, Michele Nazareth da. "Codage spatio-temporel tensoriel pour les systèmes de communication sans fil MIMO." Thesis, Nice, 2014. http://www.theses.fr/2014NICE4014/document.
Full textSince the growing success of mobile systems in the 1990s, new wireless technologies have been developed in order to support a growing demand for high-quality multimedia services with low error rates. An interesting way to improve the error performance and to achieve better transmission rates is to combine the use of various diversities and multiplexing access techniques in the MIMO system context. The incorporation of oversampling, spreading and multiplexing operations and additional diversities on wireless systems lead to multidimensional received signals which naturally satisfy tensor models. This thesis proposes a new tensorial approach based on a tensor space-time (TST) coding for MIMO wireless communication systems. The signals received by multiple antennas form a fourth-order tensor that satisfies a new tensor model, referred to as PARATUCK-(2,4) (PT-(2,4)) model. A performance analysis is carried out for the proposed TST system and a recent space-time-frequency (STF) system, which allows to derive expressions for the maximum diversity gain over a at fading channel. An uplink processing based on the TST coding with allocation resources is proposed. A new tensor decomposition is introduced, the so-called PT-(N1,N), which generalizes the standard PT-2 and our PT-(2,4) model. This thesis establishes uniqueness conditions for the PARATUCK-(N1,N) model. From these results, joint symbol and channel estimation is ensured for the TST and STF systems. Semi-blind receivers are proposed based on the well-known Alternating Least Squares algorithm and the Levenberg-Marquardt method, and also a new receiver based on the Kronecker Least Squares (KLS) for both systems
Andraud, Martin. "Solutions pour l'auto-adaptation des systèmes sans fil." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAT037/document.
Full textThe current demand on ubiquitous connectivity imposes stringent requirements on the fabrication of Radio-Frequency (RF) circuits. Designs are consequently transferred to the most advanced CMOS technologies that were initially introduced to improve digital performance. In addition, as technology scales down, RF circuits are more and more susceptible to a lot of variations during their lifetime, as manufacturing process variability, temperature, environmental conditions, aging… As a result, the usual worst-case circuit design is leading to sub-optimal conditions, in terms of power and/or performance most of the time for the circuit. In order to counteract these variations, increasing the performances and also reduce power consumption, adaptation strategies must be put in place.More importantly, the fabrication process introduces more and more performance variability, which can have a dramatic impact on the fabrication yield. That is why RF designs are not easily fabricated in the most advanced CMOS technologies, as 32nm or 22nm nodes for instance. In this context, the performances of RF circuits need to be calibrated after fabrication so as to take these variations into account and recover yield loss.This thesis work is presenting on a post-fabrication calibration technique for RF circuits. This technique is performed during production testing with minimum extra cost, which is critical since the cost of test can be comparable to the cost of fabrication concerning RF circuits and cannot be further raised. Calibration is enabled by equipping the circuit with tuning knobs and sensors. Optimal tuning knob identification is achieved in one-shot based on a single test step that involves measuring the sensor outputs once. For this purpose, we rely on variation-aware sensors which provide measurements that remain invariant under tuning knob changes. As an auxiliary benefit, the variation-aware sensors are non-intrusive and totally transparent to the circuit.Our proposed methodology has first been demonstrated with simulation data with an RF power amplifier as a case study. Afterwards, a silicon demonstrator has then been fabricated in a 65nm technology in order to fully demonstrate the methodology. The fabricated dataset of circuits is extracted from typical and corner wafers. This feature is very important since corner circuits are the worst design cases and therefore the most difficult to calibrate. In our case, corner circuits represent more than the two third of the overall dataset and the calibration can still be proven. In details, fabrication yield based on 3 sigma performance specifications is increased from 21% to 93%. This is a major performance of the technique, knowing that worst case circuits are very rare in industrial fabrication
Bezahaf, Mohamed El Mehdi. "Gestion transparente de la mobilité dans un environnement maillé sans-fil réel." Paris 6, 2010. http://www.theses.fr/2010PA066559.
Full textAgba, Landaabalo. "Elaboration de logiciel d'aide au déploiement de réseaux sans fil millimétriques." Limoges, 2004. http://aurore.unilim.fr/theses/nxfile/default/4e4f4064-e256-4878-aa69-3c7844b0f2ae/blobholder:0/2004LIMO0020.pdf.
Full textThe deployment of wireless networks in an outdoor environment is complex because of the numerous parameters which must be taken into account. In this context, this report presents a relevant planning software for networks deployment which integrates these multiple parameters in millimetric frequency band. Rays Tracing method is used in association with antennae characteristics and propagation channel parameters. The coverage simulations on real cases are realized using GIS (Geographic Information system) databases coupled with aerial view photographs and GPS (Global Positioning System) measurements. The precision of the simulations was successfully confirmed by experimental measurements. This software allowed to propose some coverage improvements of a 40 GHz LMDS (Local Multipoint Distribution Services) system using new antennae topologies, reflectors and repeaters
Darties, Benoît. "Problèmes algorithmiques et de complexité dans les réseaux sans fil." Montpellier 2, 2007. http://www.theses.fr/2007MON20204.
Full textThe last couple of years have seen the advent of wireless networks, doped by their ease of deployment and their use in multiple fields: personal WiFi networks, mobile telephony, ad hoc networks, sensors networks,. . . The subject of this thesis relates to the study of algorithmic problems directly inspired by operating constraints which can be found in such networks. This manuscrit is divided into three parts. The first part of our work is devoted to the study of the problem of broadcasting a single source node message to all the other nodes of a network. This problem is tackled in various communication models. All the considered model suppose range-fixed omnidirectional transmissions subject to interference phenomena. It results from that, that any given node is unable to retrieve simultaneously two incoming transmissions. We study the complexity of this problem and propose some strategies in order to solve it. In a second part, We study another algorithmic problem in the same communication model, whose object is to satisfy a given set of communication requests. Our work consists in etablishing the complexity of this problem, and studying the impact of various factors on this complexity. The last part considers the problem of designing survivable radio networks. The objective is to ensure a distribution of bandwidth from source nodes to customers nodes, by minimizing the cost of the deployed infrastructure. Communications are made via directional antennas, and are not subjects to interferences. The difficulty of the problem lies in the satisfaction of deployment constraints (limited number of antennas per node, robustness against failures of nodes,. . . ). We study the complexity of this problem, and propose exact and approximated resolution methods to solve reasonable size instances
El, Qachchach Imad. "Optimisation des codes en métrique rang pour les systèmes de communication sans fil." Thesis, Limoges, 2019. http://www.theses.fr/2019LIMO0024.
Full textIn this thesis, we have considered the rank metric codes for wireless sensor networks. Firstly, we have introduced the rank metric codes. Then, we adapted these codes, which were originally dedicated to cryptography applications, for error correction. To this end, we have studied the behavior of the family of rank metric codes in a wireless communication scenario using network coding. In this context, three types of errors are considered, background noise, errors injected into the network by a malicious user and erasures caused by node failures. Our analysis of the Low Rank Parity Check codes (LRPC) has shown that they are more suited to wireless sensor networks and they perform better than Gabidulin codes used in the literature. This analysis has been generalized in the multisource context and has shown that LRPC codes are more efficient in this context compared to Gabidulin codes. These contributions give a new incentive for the use of rank metric codes and offer interesting perspectives
La, Chi Anh. "Réplication de contenu dans les réseaux sans fil mobiles." Paris, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00545009.
Full textThe growth of mobile devices and network-based services nowadays has raised a timely question on how to efficiently distribute the data items to mobile users. Network applications need data as an input to process and provide information to users. Consequently, data traffic exerted by mobile devices fetching content is a drainage of mobile operators’ network resources. Mobile users are now coping with the congestion at network gateways and due to the unpredictability of human mobility, mobile service providers cannot sufficiently provision infrastructures for their customers. Content replication in this context has been proved as a good solution to enhance network performance and scalability. In this thesis, we tackle the issues of content replication in heterogeneous mobile networks. Such scheme requires us to solve two basic questions: where and how many replicas should be placed in the system. We study the solution through the lenses of facility location theory and design a distributed mechanism that reduces content access latency and avoids congestion at mobile gateways. Additionally, we consider the resource constraints of mobile devices and introduce a P2P cache-and-forward mechanism for load balancing purpose. We evaluate our mechanisms against realistic human mobility models. Finally, to address rational users who may behave selfishly in replicating content, we derive a cost model and study content replication scheme using tools akin to game theory. Based on the theoretical findings, our future work is to develop the strategies to be implemented in a practical network setting
Mourgues, Nicolas de. "Contribution à la recherche et à la formalisation d'un noyau fonctionnel commun pour les réseaux locaux et les communications associées." Paris 2, 1995. http://www.theses.fr/1995PA020059.
Full textTje local area networds were an essential issue in the 80s, whereas 10 years later, multimedia and the data highways have become the preponderant therne. The present thesis shows that the lans will dominate in the furture and will base on the most modern communication techniques. It means they will even and for example base on the national and international data networks, on the distributed object oriented databases and on the virtural reality. A first study of the lan standard quality gives to the reader a complete view of the theme. A technical comparison between several local area network conceptions gives the the present stage of development of these lans. A last part basing on the preceding study and on the new information technologies proposes a formation of functions that can be used as implantation base for the future computer operating systems with thue aim to totally realize the most important features of the lans which are the distribution attributes
Fawaz, Nadia. "Communications coopératives pour les réseaux ad hoc sans fil." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00004836.
Full textFawaz, Nadia. "Communications coopératives pour les réseaux ad hoc sans fil." Phd thesis, Paris, ENST, 2008. https://pastel.hal.science/pastel-00004836.
Full textWireless ad hoc networks received significant attention because of their defense and commercial applications. Most research on ad hoc networks focused on routing protocols. However, the theoretical and practical limits of the performance of dense ad hoc networks recently unveiled, revealed the need for alternative techniques to improve the interference-limited performance of dense ad hoc networks. In this thesis, we address the following issue: how can the link-capacity performance in wireless ad hoc networks be improved through the use of more advanced physical layer techniques? We first introduce the physical layer factors that impact the performance of dense ad hoc networks. In particular, we show how the throughput can be improved by using directive antennas, or by managing the number and position of relays. Then, we turn our attention to ad hoc networks in which nodes are empowered with cooperative capabilities. We first consider networks with a small number of nodes and propose techniques to improve spectral efficiency. The proposed cooperative strategies make more efficient use of the wireless resource by combining orthogonality-relaxation and dirty paper coding. Finally, networks with a high density of nodes are examined and cooperation is introduced through a cooperative-clustering approach. Using tools from random matrix and free probability theory, we analyze the asymptotic capacity of the system when the node density increases. This thesis shows that the link-capacity performance of dense wireless ad hoc networks can be improved as long as nodes are empowered with cooperative capabilities at the physical layer, and cooperative strategies are properly designed
Kamel, Sarah. "Sécurité pour les réseaux sans fil." Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0011.
Full textToday, there is a real need to strengthen the communication security to anticipate the development of quantum computing and the eventual attacks arising from it. This work explores two complementary techniques that provide confidentiality to data transmitted over wireless networks. In the first part, we focus on lattice-based public-key cryptography, which is one of the most promising techniques for the post-quantum cryptography systems. In particular, we focus on the Goldreich-Goldwasser-Halevi (GGH) cryptosystem, for which we propose a new scheme using GLD lattices. In the second part of this work, we study the security of multi-user cache-aided wiretap broadcast channels (BCs) against an external eavesdropper under two secrecy constraints: individual secrecy constraint and joint secrecy constraint. We compute upper and lower bounds on secure capacity-memory tradeoff considering different cache distributions. To obtain the lower bound, we propose different coding schemes that combine wiretap coding, superposition coding and piggyback coding. We prove that allocation of the cache memory to the weaker receivers is the most beneficial cache distribution scenario
Chelius, Guillaume. "Architectures et communications dans les réseaux spontanés sans-fil." Lyon, INSA, 2004. http://theses.insa-lyon.fr/publication/2004ISAL0024/these.pdf.
Full textThis PhD addresses several issues bound to ad hoc and sensor networks. We first define the notion of ad hoc architecture before describing our two proposals, Ana4 and Ana6. These architectures are notably used to evaluate and optimize unicast routing in wireless hybrid networks, i. E. , the rnerging of a wireless infrastructure network and ad hoc connectivity. Then we study ad hoc multicast routing. After having presented NP-completeness results for both ad hoc multicast and broadcast problems, we describe our ad hoc multicast routing protocol DMZ (Dense Multicast Zone). DMZ uses tree and mesh structures to create robust diffusion structures and rely on the notion of dense zones. Fin ally, we address the issue of energy consumption in sensor networks. Using a new analytical model, we derive upper and lower bounds for the minimum energy broadcast and covering problems
Bobineau, Christophe. "Gestion de transactions en environnement mobile." Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERS0031.
Full textAbid, Mohamed Amine. "Systèmes de localisation en temps réel basés sur les réseaux de communication sans fil." Thèse, Université de Sherbrooke, 2016. http://hdl.handle.net/11143/8820.
Full textDalla'Rosa, Alexandre. "Modélisation et optimisation de la localisation d'émetteurs dans des systèmes de communication sans fil." Paris 11, 2007. http://www.theses.fr/2007PA112299.
Full textDuring the last years, portability has been the “key” for the extraordinary expansion of the personal communication systems (PCS) in urban environments. People located anywhere, at any time, can access private and collective services, exchanging information, safely and quickly, without any fixed “wireline” connection (e. G. Bluetooth, WiFi, etc. ). One of the most important considerations in successful implementation of PCS is the indoor radio communication. For more than 10 years the indoor radio propagation channel is investigated and several tools were deployed based on two different approaches to deal with the wave propagation problem: empirical and deterministic approaches. In a few words, the main differences between these two techniques are the exactness and the waste time to build and solve a wave propagation problem. Up to now, most of the indoor PCS architectures are based on empirical approaches based on the simplicity and low computational cost. However, the evolution of the wireless systems and the associated disturbances in urban environment demands more efficient tools to guarantee an efficient expansion of PCS. In this work a technique is presented to investigate the indoor radio propagation channel and search for the optimal transmitter location. The TLM method and the Kriging technique are combined to approach an objective function in order to solve at low cost an optimization problem corresponding to an electromagnetic indoor environment prediction. The technique is applied to search the optimal transmitter location in a realistic problem
Amirzadeh, Ahmadreza, and Ahmadreza Amirzadeh. "Amélioration de la sécurité et de la fiabilité des systèmes de communication sans fil." Master's thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/27478.
Full textDans ce mémoire, de nouvelles approches ont été introduites pour concevoir les systèmes de communication fiables, Section 1, et sécurisées, Section 2, où les codes LDPC ont été choisis comme schéma de codage principal. Ce mémoire comprend deux sections : Section 1 : Les codes LDPC réguliers et irréguliers sont définis et différents décodeurs basés sur l’échange de message de décisions fermes et souples sont introduits. Par la suite, quelques définitions, comme le seuil des codes LDPC utilisant l’évolution de la densité de probabilité (ou la propagation de croyance), l’écart multiplicatif et les distributions de degrés de noeuds de parité et de noeuds de variable, sont énoncées. Par après, ces concepts préliminaires sont utilisés pour concevoir des ensembles de code LDPC irréguliers approchant la capacité du canal à l’aide de programmation linéaire et d’un algorithme génétique. Section 2 : Une méthode est introduite pour l’amélioration du secret dans ce genre de système. Cette méthode fonctionne sur la base de demande de retransmission de paquets d’information. Selon cette approche, lorsque le récepteur ne peut pas converger vers le bon message, une demande de retransmission est envoyée. Au lieu d’envoyer le paquet entier dans le cas d’une défaillance à la sortie du décodeur du destinataire, la retransmission des sous-paquets est explorée. Le système proposé dans cette phase est appelé protocole HARQ-Granulaire Adaptatif (AG-HARQ). Il essaie de réduire au minimum le taux requis pour un décodage réussi par les parties légitimes tout en augmentant la sécurité en minimisant les fuites d’information vers un espion éventuel. En outre, pour améliorer encore le niveau de sécurité dans la méthode AG-HARQ proposée, le schéma de contamination d’erreur intra-trame (IntraEC) et le schéma de contamination d’erreur inter-trame (InterEC) sont utilisés en conjonction avec cette méthode. Cette combinaison permet un haut niveau de sécurité dans le système de communication sans fil.
In this memoir, new approaches have been introduced for designing reliable, Section 1, and secure, Section 2, communication systems where the LDPC codes have been chosen as the principal coding scheme. This memoir comprises two sections: Section 1: Regular and irregular LDPC codes are defined and different message passing decoders based on hard and soft decisions are introduced. Afterward, some definitions like the threshold of LDPC codes using Density Evolution (or Belief Propagation), the Multiplicative Gap, and the check node and variable node degree distributions are explained in detail. Later, these preliminary concepts are used to design the channel capacity approaching Irregular LDPC codes combining Genetic Algorithm and Linear Programming. Section 2: A new scheme is introduced for secrecy enhancement for these systems. This method is based on feedback retransmission requests. With this approach, when the intended recipient cannot converge to the right message, a retransmission request is sent back to the transmitter. The retransmission of the sub-packets, instead of sending the whole packet in the case of failure at the intended recipient’s decoder output, is explored in detail. Our proposed scheme is called Adaptive Granular Hybrid Automatic Repeat reQuest (AG-HARQ) protocol, which tries to minimize the required rate for successful decoding of the legitimate parties while amplifying the privacy by minimizing the information leakage to a wiretapper. In addition, to further improve the security level of the proposed AG-HARQ method, Intra-frame error contamination (IntraEC) and Inter-frame error contamination (InterEC) schemes are used in conjunction with this method. This combination can provide a high level of security in wireless communication systems.
In this memoir, new approaches have been introduced for designing reliable, Section 1, and secure, Section 2, communication systems where the LDPC codes have been chosen as the principal coding scheme. This memoir comprises two sections: Section 1: Regular and irregular LDPC codes are defined and different message passing decoders based on hard and soft decisions are introduced. Afterward, some definitions like the threshold of LDPC codes using Density Evolution (or Belief Propagation), the Multiplicative Gap, and the check node and variable node degree distributions are explained in detail. Later, these preliminary concepts are used to design the channel capacity approaching Irregular LDPC codes combining Genetic Algorithm and Linear Programming. Section 2: A new scheme is introduced for secrecy enhancement for these systems. This method is based on feedback retransmission requests. With this approach, when the intended recipient cannot converge to the right message, a retransmission request is sent back to the transmitter. The retransmission of the sub-packets, instead of sending the whole packet in the case of failure at the intended recipient’s decoder output, is explored in detail. Our proposed scheme is called Adaptive Granular Hybrid Automatic Repeat reQuest (AG-HARQ) protocol, which tries to minimize the required rate for successful decoding of the legitimate parties while amplifying the privacy by minimizing the information leakage to a wiretapper. In addition, to further improve the security level of the proposed AG-HARQ method, Intra-frame error contamination (IntraEC) and Inter-frame error contamination (InterEC) schemes are used in conjunction with this method. This combination can provide a high level of security in wireless communication systems.
Guéguen, Cédric. "Allocation de ressources dans les réseaux sans fil à large bande multi-porteuses." Paris 6, 2010. http://www.theses.fr/2010PA066437.
Full textKhan, Farooq. "Accès multiple et allocation des ressources pour réseaux multimédia sans fil." Versailles-St Quentin en Yvelines, 1997. http://www.theses.fr/1997VERS0003.
Full textBehlouli, Abdeslam. "Simulation du canal optique sans fil. Application aux télécommunications optique sans fil." Thesis, Poitiers, 2016. http://www.theses.fr/2016POIT2308/document.
Full textThe context of this PhD thesis falls within the scope of optical wireless communications for applications in indoor environments. To discuss the performance of an optical wireless link, it is necessary to establish a characteristic study of the behavior of the optical wave propagation channel. This study can be realized by measurement or by the simulation of the channel impulse response. After describing the composition of an optical wireless link and reviewing existing simulation methods, we present our new simulation algorithms channel in realistic environments by focusing on their performances in terms of accuracy and their complexity in terms of computation time. These methods are based on solving the light transport equations by ray-tracing techniques associated with stochastic Monte Carlo integration methods. The classical version of these methods is the basis of three proposed simulation algorithms. By applying an optimization using Markov Chain, we present two new algorithms. A performance assessment of our simulation algorithms is established in mono and multi-antenna scenarios of our simulation algorithms. Finally, we present the application of these algorithms for characterizing the impact of the simulation environment on the performances of a visible light communication link. We particularly focus on the transmitter models, surface coating materials, obstruction of the user's body and its mobility, and the geometry of the simulation scene
Combes, Richard. "Mécanismes auto-organisants dans les réseaux sans fil." Paris 6, 2013. http://www.theses.fr/2013PA066028.
Full textIn this thesis we study the design, modeling and performance evaluation of mechanisms which can manage wireless networks autonomously (self-organizing mechanisms). We recall the technological context, and the required mathematical tools are introduced concisely: queuing theory, point processes, information theory, stochastic approximation, Markov decisions processes and reinforcement learning. In the first part, we study opportunistic scheduling. We are interested in their performance evaluation and their use to perform coverage-capacity optimization. Physical layer phenomena such as channel fading, interference, receiver structure and practical modulation and coding schemes are taken into account. In the second part, an algorithm for automatic load balancing is presented. The dynamical arrivals and departures of users are taken into account. For stationary traffic, the convergence of the mechanism to the optimal configuration is shown using stochastic approximation theorems. For non-stationary traffic, numerical experiments suggest that the mechanism is able to adapt itself to daily traffic patterns. In the third part, we study relay-enhanced networks. Based on a queuing analysis, a simple formula for network dimensioning is given. It is valid for the most general traffic model (stationary ergodic input). The load balancing mechanism is extended to relay-enhanced networks. A dynamical load balancing algorithm based on reinforcement is studied
Dreina, Emmanuel. "Conception, optimisation et intégration RF d'un système d'antennes miniatures multicapteurs utilisant la diversité en vue d'augmenter les eprformances radio d'un terminal mobile 4G." Grenoble INPG, 2010. http://www.theses.fr/2010INPG0060.
Full textLn urban or indoor environment, communications are altered by multiple reflections leading to multipath fading on RF signal. Antenna diversity provides an efficient me ans to improve the radio link in these environments. We worked on different compact diversity antennas structures. To compare their performance, we have developed a theoretical methodology for diversity evaluation by introducing new concepts like the referenced diversity gain. This methodology allows choosing an optimized antenna system for a given application. Ln addition to our study on theoretical tools, we developed a test bench in order to quantify the radio link improvement bring by an antenn versity system in terms of BER. Our experimental method for diversity gain evaluation involves a testbench using realistic modulated RF signaIs. It differs from experimental methods proposed in recent previous works. Finally, experimental procedure and first measurement results are detailed in this document
Munir, Muhammad Farukh. "Optimisation inter-couche de réseaux de capteurs et capteurs-actionneurs sans fil." Paris, ENST, 2009. http://www.theses.fr/2009ENST0039.
Full textCheikh, M'hand Mohamed. "Etude du canal de propagation radio pour les systèmes embarqués sans fil automobile." Phd thesis, Toulouse, INPT, 2010. http://oatao.univ-toulouse.fr/17847/1/cheikh_mhand.pdf.
Full textDjouama, Amir. "Contrôle de topologie ambiant dans les réseaux sans fil." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0019.
Full textWith the evolution of the wireless communication systems and the increasing control of complexity in the material, it becomes possible to conceive network architectures dynamicaly controlable and equiped with a capacity of ambient decision. Within the framework of the thesis we propose to study and optimize the control of a network made up of mobile nodes wich communicate without infrastructure. Two levels of control will be considered, one being at the level of the lower layers while the other adresses the aspects relating to the higher layers. The dynamic control on the level of the lower layers relates to two aspects : 1- The adaptation of the topology of the network and the routing to the requests coming from the lower layers. 2- Optimization inter-layer (cross-layer) in order to use as well as possible the resources of the network and in particular the radio. The dynamic control on the level of the higher layer relates to the discovery and the adaptation of the application to the services of communications offered by the lower layers. In a second step, we study the admission control. We propose to study the local parameters of each node, wich are interesting for the continuity of sessions. An approach for admission control is given which interact lifetime of nodes and their point of attachment
Ben, Halima Slim. "Gestion des interférences pour les réseaux de femtocells en se basant sur les techniques MIMO coopératives." Rennes, INSA, 2012. http://www.theses.fr/2012ISAR0028.
Full textIn this work we address the interference problem generated in a network of femtocells cooperating at channel state information level and not at user data level. In a first part, we investigate some cooperation strategies based on conventional MIMO pre-coding techniques such as maximum ratio transmission and zero forcing. These strategies are designed for some particular deployments especially those where operators aim at offering some fair QoS for their subscribers. In a second part, we exploit the interference alignment (IA) technique to manage the interference issues. We propose in a first step three joint clustering and scheduling schemes for overloaded femtocell networks where IA is not feasible on all the links. The complexity of these clustering schemes is reduced in a second phase. Then, we design a distributed algorithm for the constant MIMO IC that aims at ensuring a set of signal to interference plus noise ratios (SINRs) at the different streams of all the links in the network. The motivation behind this algorithm is that IA is not always the best strategy depending on system signal to noise ratio. Finally, we tackle the issue of the choice of the target SINRs. We propose three network coordination algorithms aiming at optimizing the used target SINRs to run the already proposed distributed algorithm
Hamdane, Walid. "Étude et développement d'architectures d'amplification à deux branches pour les systèmes de communication sans fil." Mémoire, École de technologie supérieure, 2010. http://espace.etsmtl.ca/268/1/HAMDANE_Walid.pdf.
Full textIvanova-Lamouret, Mila. "Conception et caractérisation de circuits intégrés radiofréquences pour les réseaux sans fil." Rennes, INSA, 2006. http://www.theses.fr/2006ISAR0002.
Full textThe aim of this work of thesis was to study the possibility to integrate some functionalities of the emission/reception systems for wireless modems : mixer and voltage controlled oscillator, using 0,8 µm BiCMOS SiGe technology of AMS. The first chapter presents some standards for the wireless local area networks and summarizes the frequencies, the access techniques and the modulations used by these standards. The second chapter is dedicated to an introduction to the emission/reception systems. The third chapter presents a little history of the integrated technologies for the wireless communication systems development. The fourth chapter is dedicated to the integrated inductances modelling. The fifth chapter presents the design and the characterization of an voltage controlled oscillator (VCO) applicable to the emission/reception systems for wireless networks. The sixth chapter is dedicated to the design and the characterization of a mixer " downconverter "
Champ, Julien. "Communication et Localisation dans les réseaux de capteurs sans-fil." Thesis, Montpellier 2, 2010. http://www.theses.fr/2010MON20133.
Full textRecent advancements in the fields of telecommunications and miniaturization make it possible to deploy for a reasonnable cost, autonomous communicating objects in order to collect environmental data, or to respond when a given event appears in the deployment area. Due to the emergence of these new kind of ad hoc networks, it is needed to design various new protocols, adapted to the constraints of considered objects and to the specific needs of targeted applications.During this thesis, the objective was to contribute to the field of wireless sensor networks by proposing solutions for some of the most important issues. In the first part of this document, dedicated to communication problems, we study and propose a new energy efficient geographical routing mechanism which overcomes the periodic exchange of HELLO messages, often required to determine sensors neighborhood. We also extend this method when considering the presence of location errors of sensors. Next, we have studied a strategy to enhance the lifetime of the network when periodic queries must be sent from the base station to the whole network, by adapting an efficient localized broadcast algorithm, in order to balance energy consumption between nodes. Additionally we have shown that it is not necessary to recompute the broadcast trees for each query to obtain a good lifetime.In the second part of this document, we considered the localization problem in wireless multihop networks. After a study of some of the most interesting solutions in the litterature, we propose a new family of localization methods which are well suited for wireless sensor networks, using 2-hop information and force-based algorithms. Through extensive simulations we show the scalabity of our method, and its ability to obtain accurate results, even when considering complex topologies or the presence of large measurement errors
Tourki, Kamel. "Conception et optimisation de protocoles de coopération pour les communications sans fil." Nice, 2008. http://www.theses.fr/2008NICE4006.
Full textCooperative mechanisms are becoming increasingly important in wireless communications and networks to substantially enhance system performance with respect to much less power consumption, higher system capacity and smaller packet loss rate. The idea of cooperation can be traced back to the information theory investigation on relay channel in cellular network. From the system point of view, since Mobile Station (MS) has limitations in single antenna, power, cost and hardware, it is infeasible to use MIMO technology in MS. Mobile users with single antennas can still take advantage of spatial diversity through cooperative space-time encoded transmission. The objective of this thesis is to introduce and discuss various cooperative strategies in wireless communications. In the first part, we present an end-to-end performance analysis of two-hop asynchronous cooperative diversity with regenerative relays over Rayleigh block-flat-fading channels, in which a precoding frame-based scheme with packet-wise encoding is used. This precoding is based on the addition of a cyclic prefix which is implemented as a training sequence. We derive, for equal and unequal sub-channel gains, the bit-error rate and the end-to-end bit-error rate expressions for binary phase-shift keying. We also present the performance of the frame-error rate and the end-to-end frame-error rate. Finally, comparisons between three system configurations, differing by the amount of cooperation, are presented. The second part contains two chapters. In the first chapter, we consider a scheme in which a relay chooses to cooperate only if its source-relay channel is of an acceptable quality and we evaluate the usefulness of relaying when the source acts blindly and ignores the decision of the relays whether they may cooperate or not. In our study, we consider the regenerative relays in which the decisions to cooperate are based on a signal-to-noise ratio (SNR) threshold and consider the impact of the possible erroneously detected and transmitted data at the relays. We derive the end-to-end bit-error rate (BER) for binary phase-shift keying modulation and look at two power allocation strategies between the source and the relays in order to minimize the end-to-end BER at the destination for high SNR. In the second chapter, we consider a scheme in which the relay chooses to cooperate only if the source-destination channel is of an unacceptable quality. In our study, we consider a regenerative relay in which the decision to cooperate is based on a signal-to-noise ratio (SNR) threshold and consider the effect of the possible erroneously detected and transmitted data at the relay. We derive an expression for the end-to-end bit-error rate (BER) of binary phase-shift keying (BPSK) modulation and look at the optimal strategy to minimize this end-to-end BER at the destination for high SNR. In the third part, we consider a multiple access MAC fading channel with two users communicating with a common destination, where each user mutually acts as a relay for the other one as well as wishes to transmit his own information as opposed to having dedicated relays. We wish to evaluate the usefulness of relaying from the point of view of the system's throughput (sum rate) rather than from the sole point of view of the user benefiting from the cooperation as is typically done. We do this by allowing a trade-off between relaying and fresh data transmission through a resource allocation framework. Specifically, we propose cooperative transmission scheme allowing each user to allocate a certain amount of power for his own transmitted data while the rest is devoted to relaying. The underlying protocol is based on a modification of the so-called non-orthogonal amplify and forward (NAF) protocol. We develop capacity expressions for our scheme and derive the rate-optimum power allocation, in closed form for centralized and distributed frameworks. In the distributed scenario, partially statistical and partially instantaneous channel information is exploited. The centralized power allocation algorithm indicates that even in a mutual cooperation setting like ours, on any given realization of the channel, cooperation is never truly mutual, i. E. One of the users will always allocate zero power to relaying the data of the other one, and thus act selfishly. But in distributed framework, our results indicate that the sum rate is maximized when both mobiles act selfishly
Kamel, Sarah. "Sécurité pour les réseaux sans fil." Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0011/document.
Full textToday, there is a real need to strengthen the communication security to anticipate the development of quantum computing and the eventual attacks arising from it. This work explores two complementary techniques that provide confidentiality to data transmitted over wireless networks. In the first part, we focus on lattice-based public-key cryptography, which is one of the most promising techniques for the post-quantum cryptography systems. In particular, we focus on the Goldreich-Goldwasser-Halevi (GGH) cryptosystem, for which we propose a new scheme using GLD lattices. In the second part of this work, we study the security of multi-user cache-aided wiretap broadcast channels (BCs) against an external eavesdropper under two secrecy constraints: individual secrecy constraint and joint secrecy constraint. We compute upper and lower bounds on secure capacity-memory tradeoff considering different cache distributions. To obtain the lower bound, we propose different coding schemes that combine wiretap coding, superposition coding and piggyback coding. We prove that allocation of the cache memory to the weaker receivers is the most beneficial cache distribution scenario
Lertsinsrubtavee, Adisorn. "Sélection et transfert de spectre adaptatifs dans les réseaux de radio cognitive." Paris 6, 2013. http://www.theses.fr/2013PA066300.
Full textCognitive radio is proposed as a promising solution for the next generation of wireless communication networks. Cognitive radio users are required to perform spectrum handoff from a wireless channel to another in order to cope with the dynamic spectrum environment imposed by licensed users. Spectrum handoff can cause transmission interruptions leading to the degradation of services. We study and develop efficient spectrum management strategies that aim to provide diverse service requirements for cognitive radio users. First, we propose novel spectrum handoff and selection strategies in order to satisfy a delay requirement. In particular, we estimate the delay of arrival packets based on the prior packets in the queue and compare it to a maximum delay bound. Then, we use the expected delays to estimate a delay violation ratio that guides the spectrum handoff and selection decisions. Our strategies reduce the number of spectrum handoff significantly compared to existing approaches while the delay requirement is guaranteed. Second, we consider the rate requirement by investigating the interaction between spectrum handoff and spectrum sharing through an optimization framework. The results provide useful insights and guidelines for designing efficient spectrum sharing heuristics that take into account spectrum handoff and selection strategies. Finally, we develop a heuristic for spectrum sharing that includes novel static and dynamic spectrum sharing algorithms based essentially on a rate compensation approach and adapted best fit algorithms. Our heuristic reduces the number of handoffs significantly while the achieved rate is fulfilling compared to the optimal
Beghdad, Rachid. "Étude d'un réseau local filaire/sans fil dédié à la domotique : développement du protocole de liaison de données." Toulouse 2, 1997. http://www.theses.fr/1997TOU20075.
Full textTechnical advances in computer science and telecommunications have led to the design of distributed home automation applications, that imply transfer and coordination of several types of messages (voice, data, pictures). "Home automation" refers to any building new technologies for its equipment, usage, and management. Many research works have focused on the definition of new protocols to face the problem involving service and user mobility in premises. This thesis deals with the context of this study and proposes a topology of a home automation wireless local area network (WLAN). This topology proposes the incorporation of intelligent wireless links to a home automation network. It includes two normalized configurations IEEE 802. 11: a wired one called "infrastructure configuration", and a wireless one called "ad hoc configuration". In order to best manage the problem of access method in the proposed network, the author proposes a MAC layer derived from the future IEEE 802. 11 norm. The study leads to the development of a new LLC (logical link control) protocol supported by the chosen MAC layer, whatever the physical layer (whether wireless or wired). This protocol describes many types of relaying frame schemes in an end-to-end dialog between two mobiles. A formal description of the LLC protocol is provided, which uses the ESTELLE formal description technique
Bonneau, Nicolas. "Mécanismes multi-utilisateurs centralisés et décentralisés pour les communications sans fil." Paris, ENST, 2007. http://www.theses.fr/2007ENST0021.
Full textAs wireless systems grow, new challenges are emerging. The exact location of the intelligence is of paramount importance: a central controller (network centric) or the users (user centric)? The performance analysis of multiuser systems is done by novel use of sophisticated methodologies: random matrix theory and game theory. The purpose is to deliver optimal quality of service to users, under constraints like energy consumption and limited knowledge of the environment. First, random matrix theory is used to optimize large cellular networks, for which simulations involve a huge number of parameters. The self-averaging effect of random matrices enables to elegantly single out parameters of interest in asymptotic systems, when both the number of chips and of users grow large with fixed ratio. Although asymptotic, results give accurate predictions of the finite size behavior, as shown by simulations. The performance analysis of centralized systems gives a bound on performance. Second, game theory is applied to distributed multiuser schemes. Game theory studies interactions among selfish players who reason strategically in order to take rational decisions. This is of considerable interest for the deployment of self-organizing networks. Some subfields are particularly promising. Correlated games enable a simple coordination mechanism between players, while evolutionary games provide additional properties of robustness of equilibrium strategies. In the asymptotic regime, non-atomic games study interactions of dense populations where the behavior of a single individual has a negligible impact on the welfare of the population as a whole
Movahedi, Zeinab. "Une architecture autonomique pour les réseaux sans-fil : proposition et méthodologie d'évaluation." Paris 6, 2011. http://www.theses.fr/2011PA066537.
Full textBru, Laurie. "Les enjeux de la normalisation européenne des objets connectés de santé." Electronic Thesis or Diss., Toulouse 1, 2019. http://www.theses.fr/2019TOU10038.
Full textConnected objects in health are emerging technologies. They are subject to many innovations and may incorporate blockchains, High Performance Computing, artificial intelligence and nanotechnologies. These objects are multiplying at a rapid rate within the internal market in the European Union and are creating new challenges, particularly with regard to the protection of personal data, public health considerations, cybersecurity and the competitivity of European companies in a globalized world. These objects need a framework. European standardization is a particularly appropriate regulatory tool to answer all these concerns. It overcomes the drawbacks of hard law, in particular because of its flexibility and ability to adapt to the evolution of the state of the art and the digitization of economy. European standardization organizations will therefore have to develop and update standards for the technologies on which connected objects in health are based. European institutions must support this standardization to ensure it is commensurate with the stakes involved
Le, Ngoc Khuyen. "Homologie simpliciale appliquée aux réseaux sans fil." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0039.
Full textSimplicial homology is a useful tool to access important information about the topology of wireless networks such as : coverage and connectivity. In this thesis, we model the wireless network as a random deployment of cells. Firstly, we introduce an algorithm to construct the Cech complex, which describes exactly the topology of the network. Then, the Cech complex is used in further applications. The first application is to save transmission power for wireless networks. This application not only maximizes the coverage of the network but also minimizes its transmission power. At the same time, the coverage and the transmission power are optimized. The second application is to balance the traffic load in wireless networks. This application controls the transmission power of each cell in the network, always under the coverage constraint. With the controlled transmission power, the users are redirected to connect to the lower traffic load cells. Consequentially, the balanced traffic load is obtained for the network
Laouiti, Mohamed Anis. "Unicast et Multicast dans les réseaux ad hoc sans fil." Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERS018V.
Full textYahiaoui, Achref. "Etude de composants MEMS RF à Nanogaps pour les systèmes de communications sans fil reconfigurables." Limoges, 2014. https://aurore.unilim.fr/theses/nxfile/default/976dd912-c811-4343-8b27-cf9102fb02e2/blobholder:0/2014LIMO4015.pdf.
Full textIn recent years, the emergence of new standards for wireless communication has introduced new challenges in the physical design of transmitters and receivers. A low energy consumption, high linearity and bandwidth, are among the most important that each component must satisfy in order to achieve high performance wireless systems requirements. At the system level, the trend adoptedin the field of wireless devices is the multi-band design, multi-mode, with greater functionnality. And, while moving towards ever more efficient architectures, smaller, lighter and less expensive. RF MEMS (Micro-Electro-Mechanical System) technology allows the creation of devices and circuits that can meet these requirements mentioned above. The basic idea of MEMS RF is use mobile miniaturized structures to design high performance resonators, variable capacitorsor varactors, inductors, and switches. Fields of application include mobile terminals, base stations, antennas, electronic scanning, multi-purpose radar, testing instruments and high precision satellite payloads. For all these applications, the RF MEMS switches using electrostatic actuation have been given special attention. RF MEMS switches have superior performance in terms of loss, linearity, power consumption and cut-off frequency compared to semiconductors, such as PIN diodes or switches FET (Field-Effect-Transistor). However, these devices suffer from a number of problems associated with the actuation voltage which remains high and has to be applied in a permanent manner, besides, the failure mechanisms including creep and integration, in the case of switching networks. It is on these aspects that carries the thesis presented in this manuscript, in the perspective of developing such components and improve their performance
Roudet, Fabrice. "Communication radiofréquence à très basse consommation d'énergie dans un environnement hautement perturbé." Grenoble INPG, 2008. http://www.theses.fr/2008INPG0090.
Full textMitton, Nathalie. "Auto-organisation des réseaux sans fil multi-sauts à grande échelle." Lyon, INSA, 2006. http://theses.insa-lyon.fr/publication/2006ISAL0023/these.pdf.
Full textWireless networks are mobile networks that do not rely over any infrastructure. Network devices have limited capacities as energy, bandwidth, memory size, etc. Current routing protocols do not allow the use of such networks over large scale. To overcome this drawback, I propose a hierarchical routing scheme for such networks. It is composed of a clustering protocol that organizes the network into groups of nodes (clusters), of a localization protocol to locate a single node in the network and of a hybrid routing protocol. Cluster structure can also be used to perform an efficient message broadcasting in the whole network. Algorithms have been studied by simulation, by comparative analysis with existing solutions and, when it was possible by a theoretical way stochastic geometry. The proposed approaches are local, distributed and use tools such the DHT and interval routing
Quignon, Jérémy. "Chargement sans fil par NFC." Electronic Thesis or Diss., Aix-Marseille, 2022. http://www.theses.fr/2022AIXM0462.
Full textThe PHD context is focused on the NFC market and its extension allowing wireless charging. This new functionality allows to charge wearable products that cannot be charged with the wireless charging technologies available on the market today. The PHD objective is to develop a solution for these wearable products, such as connected watches and bracelets, wireless headphones, connected glasses, ... This solution must satisfy NFC standards while seeking to optimize the performance of power transfer