Tesis sobre el tema "Sensor heterogeneity"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 17 mejores tesis para su investigación sobre el tema "Sensor heterogeneity".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Stathopoulos, Athanasios. "Exploiting heterogeneity for routing in wireless sensor networks". Diss., Restricted to subscribing institutions, 2006. http://proquest.umi.com/pqdweb?did=1276406591&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Texto completoBarceló, Lladó Marc. "Wireless sensor networks in the future internet of things: density, mobility, heterogeneity and integration". Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/319688.
Texto completoWireless sensor networks (WSNs) are expected to revolutionize the way we live, work, and interact with the physical environment. Although WSNs have been in the spotlight of the research community for the last decade, their performance in practical implementations is still far behind the theoretical results. This is mainly due to the practical issues that arise in real-life scenarios. As a result, WSNs are generally limited to simple environmental sensing applications. The aim of this thesis is to reduce the gap between the theoretical and real potential of WSNs, and therefore increase their integration in society. In particular, this thesis focuses on the following four practical obstacles: high node density, node mobility, traffic heterogeneity and integration with the future Internet of Things (IoT). First, we deal with the interference problem in high density sensor deployments. We address this issue proposing a pragmatic joint routing, transmission power control and channel allocation approach, built upon the well-known RPL (Routing Protocol for Low-Power and Lossy Networks). This reduces the average packet collisions and the energy consumption of WSNs. Second, we address the low communication reliability and robustness in WSNs with mobile nodes. In particular, we propose a solution that combines RPL with a position-based routing approach based on Kalman filtering. This provides the efficiency and reliability of RPL, and also includes mobility support for non-static nodes. Third, we study the problem of QoS (Quality of Service) provisioning in WSNs managing heterogeneous traffic. With this in mind, we propose a multi-tree approach based on the construction of multiple RPL Instances. This constructs multiple virtual topologies to address the particular requirements of each traffic flow individually. Finally, we focus on the efficient integration of wireless sensors with Cloud-based IoT platforms. In particular, we propose a formulation to orchestrate the resource utilization of the whole network, taking advantage of the recent advances in virtualization and mobile cloud computing. This optimizes the overall consumption, considering the capabilities and limitations of each node, while satisfying the service requirements and the individual users' demands.
Erdenebat, Elberel. "Study of New Afton ore heterogeneity and its amenability to sensor based ore sorting". Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/62969.
Texto completoApplied Science, Faculty of
Mining Engineering, Keevil Institute of
Graduate
Sevgi, Cuneyt. "Network Dimensioning In Randomly Deployed Wireless Sensor Networks". Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12611213/index.pdf.
Texto completoAli, Sohail Feroz. "Heterogeneity in the population response of a human cell line to hydrogen peroxide as measured by a genetically encoded sensor". Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79323.
Texto completoCataloged from PDF version of thesis.
Includes bibliographical references (p. 22-26).
Genetically encoded ratiometric sensors can provide valuable mechanistic understanding of biological systems. Characterization of cellular response of these sensors is the first step in validating their use. Here, we characterize the response of a genetically encoded H₂O₂ sensor, HyPer, expressed in HeLa cells. Using quantitative fluorescence microscopy, we found significant heterogeneity in HyPer response among the cell population. Further analysis showed that the variation in HyPer response was dependent on expression of HyPer protein as well as on cell cycle phase. Cells with higher levels of expressed HyPer protein showed a stronger HyPer response to H₂O₂. Cells synchronized in S-phase showed a weaker HyPer response than unsynchronized cells. It was determined that this weaker response could be a function of higher antioxidant capacity in S-phase cells. The dependence of HyPer response on these factors needs to be accounted for to avoid experimental artifacts.
by Sohail Feroz Ali.
S.M.
Atoui, Ibrahim Abdelhalim. "Data reduction techniques for wireless sensor networks using mathematical models". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD009.
Texto completoIn this thesis, we present energy-efficient data reduction and security techniques dedicated for wireless sensor networks. First, we propose a data aggregation model based on the similarity function that helps in removing the redundant data. In addition, based on the fitting functions we worked on sending less data features, accompanied with the fitting function that expresses all features. Second, we focus on heterogeneity of the data while studying the correlation among these multivariate features in order to enhance the data prediction technique that is based on the polynomial function, all after removing the similar measures in the aggregation phase using the Euclidean distance. Finally, we provide a rigorous security framework inherited from cryptography satisfies the level of exigence usually attained in tree-based WSNs. It prevents attackers from gaining any information about sensed data, by ensuring an end-to-end privacy between sensor nodes and the sink. In order to validate our proposed techniques, we implemented the simulations of the first technique on real readings collected from a small Sensor Scope network which is deployed at the Grand-St-Bernard, while the simulations of the second and the third techniques are conducted on real data collected from 54 sensors deployed in the Intel Berkeley Research Lab. The performance of our techniques is evaluated according to data reduction rate, energy consumption, data accuracy and time complexity
Hamidouche, Ranida. "Paradigme bio-inspiré dans les réseaux intelligents dynamiques au service de l’internet des objets". Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG066.
Texto completoToday the Internet makes it possible to connect billions of heterogeneous electronic devices and ensures communication between them. These devices have sensors designed with resource constraints that significantly affect data collection, especially memory and battery size limitations. The divergences in the characteristics of these objects require new intelligent methods to ensure communication between them. Heuristic solutions become obsolete or powerless to satisfy the user's requirement, hence a search for new methods becomes necessarily necessary to satisfy users. Among these solutions, we have those based on bio-inspired models. In this context, intending to minimize data loss, we propose different bio-inspired approaches for the mobility of the data collector and the choice of meeting points for data collection.First of all, we propose mobility inspired by the movement of Escherichia Coli bacteria. Then, we propose a technique inspired by the grouping of grey wolves and whales for the choice of meeting points. Afterward, we improve the mobility of the collector by mobility inspired by salps.Finally, we combine these approaches by taking into account the urgency of the data. The different contributions were evaluated using simulations and then were compared with similar existing work.The results obtained are very promising in terms of energy consumption and the amount of data collected
Ben, Saad Leila. "Stratégies pour améliorer la durée de vie des réseaux de capteurs sans fil". Thesis, Lyon, École normale supérieure, 2011. http://www.theses.fr/2011ENSL0689.
Texto completoImproving the network lifetime is a very challenging problem that needs to be taken into account during the deployment of wireless sensor networks (WSNs). Indeed, these networks are composed of many autonomous sensors with a limited energy supply provided by batteries which are usually difficult to recharge or replace. The scientific challenge is to ensure the operation of these networks for several years without major external intervention. To maximize the lifetime of WSNs, we first explored the possibility of introducing multiple mobile sinks. We proposed two mobility strategies. The first one provides the optimal placement in a network of small scale. The second one is based on an heuristic algorithm that ensures scalability.We were then interested in IPv6 based WSNs which use the new proposed routing protocol by IETF namely RPL. We studied this protocol, extended its capacity to manage mobile sinks andproposed an appropriate sinks mobility strategy that extends the network lifetime.Next, we proposed a novel approach which consists in applying Slepian-Wolf coding to emitted addresses in WSNs. The basic idea is to exploit the addresses correlation, guaranteed by an appropriate addresses allocation scheme, in order to reduce the header size of packets transmitted to the sink and thus improve the network lifetime.Finally, we proposed an hybrid IPv6 infrastructure for smart buildings which combines the wireless and power line technologies to guarantee energy efficiency and a longer network lifetime
Ben, Saied Yosra. "Collaborative security for the internet of things". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.
Texto completoLegha, Wassim. "Contribution à l'élucidation de la fonction de la protéine STAC2 dans la spécification des neurones somatiques sensoriels". Thesis, Aix-Marseille 2, 2010. http://www.theses.fr/2010AIX22031/document.
Texto completoThe somatic sensory nervous system detects and transmits sensory information from peripheral by sensory neurons that have their cell body encompassed in the dorsal root and trigeminal ganglia. Although this functional heterogeneity has been demonstrated, the molecular mechanisms characterizing it are less known. In order to contribute to the molecular characterization of the neuronal population of DRG, we have identified a new gene, stac2. We have shown that stac2 specifies a distinct neuronal subpopulation in the DRG. The genetic invalidation of stac2 in mice showed no effect of stac2 on neuronal survival and maturation. The behavioral analysis of mice lacking stac2 showed an important role of this gene in the perception and discrimination of cold temperatures and in the peripheral sensitization to noxious cold
Pedrant, Annaïg-Charlotte. "Départ à la retraite et hétérogénéité des seniors : l'impact des politiques publiques". Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAA015/document.
Texto completoThe aging of the population calls into question the sustainability of Pay-As-You-Go pension system, especially in Europe. Therefore, several reforms have been implemented to face this demographic challenge. However, the effects of those reforms have been questioned. Indeed, the success of such policies depends on how people respond to changes in their pension eligibility. In reality though, several factors may limit the reforms impact. People are indeed heterogeneous in terms of work environment and family. These heterogeneity may affect their retirement behaviors. To not take into account this individuals’ heterogeneity may lead to bias within public policy evaluations. Hence, this thesis analyses, with econometrics methods, determinants of retirement decisions making process by considering this individuals’ heterogeneity. First, the heterogeneity within work environment is taken into account by analyzing the role of job quality in the process of retirement decisions. Second, the family heterogeneity is studied by questioning joint retirement process into couples and determinants of this process for each spouse. Third, consequences to public policies are then studied as it is estimated to what extent a change in pension eligibility rules has direct and also spillover effects, through the partner, on spouses’ retirement probabilities. Results of this thesis work highlight the significant role of older workers’ heterogeneity during retirement decision. Those findings thus encourage policy makers to take into account this individuals’ heterogeneity. The coordination of social policies relate to retirement, family and job quality is a key issue for reflection
Tarot, Pauline. "Caractérisation anatomo-fonctionnelle des cellules exprimant les récepteurs D2 à la dopamine (D2R) dans la moelle spinale de souris". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTT071.
Texto completoThe spinal cord is the major relay station for sensory information generated at the periphery and transferred for processing to the brain. Sensitive primary afferent fibers arrive to the dorsal horn that is populated by a vast diversity of neurons that forms a complex network of excitatory and inhibitory circuits. Previous studies indicated that these neuronal ensembles could be modulated by the spinal dopaminergic system notably through the dopamine D2 receptors (D2R). A dysfunction of descending dopaminergic pathways could lead to pathology like Rest Less Syndrom. Nevertheless, mechanisms by which dopamine acts are poorly understand. All dopamine receptors are expressed in the spinal cord and the most abundant is the D2R and the precise identity and role of spinal D2R-cells remains largely unknown. In this study, we focused on the anatomo-functional characterization of the neurons containing D2R in the mouse spinal cord. Thanks to the mouse model Drd2:Cre-Ribotag previously developed in our lab, we could show that D2R-positive cells are expressed all along the spinal cord with a preferential expression in the dorsal horn. D2R are expressed in a very heterogeneous population, in excitatory and inhibitory neurons. We have shown that conditional KO of drd2 in lumbar cord didn’t lead to ataxia, paralysis or locomotor alteration. This study allow to unravel the precise neurochemical identity of D2R-neurons. Future studies could use this descriptive study to choose a more specific functional approach to better understand spinal dopaminergic pathways using D2R.Key words: dopamine, D2R, spinal cord, molecular heterogeneity, sensorimotor
Ben, Saied Yosra. "Collaborative security for the internet of things". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0013.
Texto completoThis thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
Sundström, Heléne. "Analytical tools for monitoring and control of fermentation processes". Doctoral thesis, KTH, Skolan för bioteknologi (BIO), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4531.
Texto completoQC 20100819
PILLAI, Vinoshene. "Intravital two photon clcium imaging of glioblastoma mouse models". Doctoral thesis, Scuola Normale Superiore, 2021. http://hdl.handle.net/11384/109211.
Texto completoTsai-Sheng, Chou. "Leveraging Heterogeneity for Maximizing Network Lifetime in Wireless Sensor Networks". 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2707200614164400.
Texto completoChou, Tsai-Sheng y 周才生. "Leveraging Heterogeneity for Maximizing Network Lifetime in Wireless Sensor Networks". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/51804174017918586258.
Texto completo國立臺灣大學
電信工程學研究所
94
Technological advances in integrated circuitry, micro-electromechanical systems, wireless communication, and storage battery in combination have driven the development of low-cost, low-power sensor nodes. Sensors can be scattered all over the region to build a wireless sensor network (WSN) for many applications such as environmental observations, habitat monitoring, intruder detection, military surveillance, and so on. Since the major role of these applications is to gather information over a long period of time, the network lifetime of WSNs has become a major concern for network designers. The increasing heterogeneity of sensor nodes, namely nodes with enhanced computation capacity, energy budget, or communication capability, is one direction along which network designers can leverage to increase the network lifetime. In this work, we explore different types of heterogeneity in terms of link heterogeneity, energy heterogeneity, and computation heterogeneity in WSNs and then consider the communication strategy to leverage those resources for maximizing the network lifetime. We formulate our problem as a linear programming (LP) problem for finding the communication strategy and investigate the performance benefits of link heterogeneity, energy heterogeneity, and computation heterogeneity. Based on the insights obtained from the theoretical formulation, we then propose a distributed algorithm to achieve the maximum network lifetime by leveraging heterogeneous nodes in a distributed manner. Simulation results shows that leveraging heterogeneity can improve the network lifetime in the wireless sensor networks.