Rozprawy doktorskie na temat „Informatique en périphérie de réseau”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Informatique en périphérie de réseau”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Santi, Nina. "Prédiction des besoins pour la gestion de serveurs mobiles en périphérie". Electronic Thesis or Diss., Université de Lille (2022-....), 2023. http://www.theses.fr/2023ULILB050.
Pełny tekst źródłaMulti-access Edge computing is an emerging paradigm within the Internet of Things (IoT) that complements Cloud computing. This paradigm proposes the implementation of computing servers located close to users, reducing the pressure and costs of local network infrastructure. This proximity to users is giving rise to new use cases, such as the deployment of mobile servers mounted on drones or robots, offering a cheaper, more energy-efficient and flexible alternative to fixed infrastructures for one-off or exceptional events. However, this approach also raises new challenges for the deployment and allocation of resources in terms of time and space, which are often battery-dependent.In this thesis, we propose predictive tools and algorithms for making decisions about the allocation of fixed and mobile resources, in terms of both time and space, within dynamic environments. We provide rich and reproducible datasets that reflect the heterogeneity inherent in Internet of Things (IoT) applications, while exhibiting a high rate of contention and interference. To achieve this, we are using the FIT-IoT Lab, an open testbed dedicated to the IoT, and we are making all the code available in an open manner. In addition, we have developed a tool for generating IoT traces in an automated and reproducible way. We use these datasets to train machine learning algorithms based on regression techniques to evaluate their ability to predict the throughput of IoT applications. In a similar approach, we have also trained and analysed a neural network of the temporal transformer type to predict several Quality of Service (QoS) metrics. In order to take into account the mobility of resources, we are generating IoT traces integrating mobile access points embedded in TurtleBot robots. These traces, which incorporate mobility, are used to validate and test a federated learning framework based on parsimonious temporal transformers. Finally, we propose a decentralised algorithm for predicting human population density by region, based on the use of a particle filter. We test and validate this algorithm using the Webots simulator in the context of servers embedded in robots, and the ns-3 simulator for the network part
Ntumba, wa Ntumba Patient. "Ordonnancement d'opérateurs continus pour l'analyse de flux de données à la périphérie de l'Internet des Objets". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS183.
Pełny tekst źródłaData stream processing and analytics (DSPA) applications are widely used to process the ever increasing amounts of data streams produced by highly geographically distributed data sources, such as fixed and mobile IoT devices, in order to extract valuable information in a timely manner for actuation. DSPA applications are typically deployed in the Cloud to benefit from practically unlimited computational resources on demand. However, such centralized and distant computing solutions may suffer from limited network bandwidth and high network delay. Additionally, data propagation to the Cloud may compromise the privacy of sensitive data. To effectively handle this volume of data streams, the emerging Edge/Fog computing paradigm is used as the middle-tier between the Cloud and the IoT devices to process data streams closer to their sources and to reduce the network resource usage and network delay to reach the Cloud. However, Edge/Fog computing comes with limited computational resource capacities and requires deciding which part of the DSPA application should be performed in the Edge/Fog layers while satisfying the application response time constraint for timely actuation. Furthermore, the computational and network resources across the Edge-Fog-Cloud architecture can be shareable among multiple DSPA (and other) applications, which calls for efficient resource usage. In this PhD research, we propose a new model for assessing the usage cost of resources across the Edge-Fog-Cloud architecture. Our model addresses both computational and network resources and enables dealing with the trade-offs that are inherent to their joint usage. It precisely characterizes the usage cost of resources by distinguishing between abundant and constrained resources as well as by considering their dynamic availability, hence covering both resources dedicated to a single DSPA application and shareable resources. We complement our system modeling with a response time model for DSPA applications that takes into account their windowing characteristics. Leveraging these models, we formulate the problem of scheduling streaming operators over a hierarchical Edge-Fog-Cloud resource architecture. Our target problem presents two distinctive features. First, it aims at jointly optimizing the resource usage cost for computational and network resources, while few existing approaches have taken computational resources into account in their optimization goals. More precisely, our aim is to schedule a DSPA application in a way that it uses available resources in the most efficient manner. This enables saving valuable resources for other DSPA (and non DSPA) applications that share the same resource architecture. Second, it is subject to a response time constraint, while few works have dealt with such a constraint; most approaches for scheduling time-critical (DSPA) applications include the response time in their optimization goals. To solve our formulated problem, we introduce several heuristic algorithms that deal with different versions of the problem: static resource-aware scheduling that each time calculates a new system deployment from the outset, time-aware and resource-aware scheduling, dynamic scheduling that takes into account the current deployment. Finally, we extensively and comparatively evaluate our algorithms with realistic simulations against several baselines that either we introduce or that originate / are inspired from the existing literature. Our results demonstrate that our solutions advance the current state of the art in scheduling DSPA applications
Foroughi, Parisa. "Towards network automation : planning and monitoring". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT038.
Pełny tekst źródłaNetwork management is undergoing drastic changes due to the high expectations of the infrastructure to support new services. The diverse requirements of these services, call for the integration of new enabler technologies that complicate the network monitoring and planning process. Therefore, to alleviate the burden and increase the monitoring and planning accuracy, more automated solutions on the element/device level are required. In this thesis, we propose a semi-automated framework called AI-driven telemetry (ADT) for collecting, processing, and assessing the state of routers using streaming telemetry data. ADT consists of 4 building blocks: collector, detector, explainer, and exporter. We concentrate on the detection block in ADT and propose a multi-variate online change detection technique called DESTIN. Our study on the explainer block of ADT is limited to exploring the potential of the input data and showcasing the possibility of the automated event description. Then, we tackle the problem of planning and dimensioning in radio access networks equipped with distributed edge servers. We propose a model that satisfies the service requirements and makes use of novel enabler technologies, i.e. network slicing and virtualization techniques. We showcase the advantages of using our holistic model to automate RAN planning by utilizing simulated annealing and greedy methods
Yu, Shuai. "Multi-user computation offloading in mobile edge computing". Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS462.
Pełny tekst źródłaMobile Edge Computing (MEC) is an emerging computing model that extends the cloud and its services to the edge of the network. Consider the execution of emerging resource-intensive applications in MEC network, computation offloading is a proven successful paradigm for enabling resource-intensive applications on mobile devices. Moreover, in view of emerging mobile collaborative application (MCA), the offloaded tasks can be duplicated when multiple users are in the same proximity. This motivates us to design a collaborative computation offloading scheme for multi-user MEC network. In this context, we separately study the collaborative computation offloading schemes for the scenarios of MEC offloading, device-to-device (D2D) offloading and hybrid offloading, respectively. In the MEC offloading scenario, we assume that multiple mobile users offload duplicated computation tasks to the network edge servers, and share the computation results among them. Our goal is to develop the optimal fine-grained collaborative offloading strategies with caching enhancements to minimize the overall execution delay at the mobile terminal side. To this end, we propose an optimal offloading with caching-enhancement scheme (OOCS) for femto-cloud scenario and mobile edge computing scenario, respectively. Simulation results show that compared to six alternative solutions in literature, our single-user OOCS can reduce execution delay up to 42.83% and 33.28% for single-user femto-cloud and single-user mobile edge computing, respectively. On the other hand, our multi-user OOCS can further reduce 11.71% delay compared to single-user OOCS through users' cooperation. In the D2D offloading scenario, we assume that where duplicated computation tasks are processed on specific mobile users and computation results are shared through Device-to-Device (D2D) multicast channel. Our goal here is to find an optimal network partition for D2D multicast offloading, in order to minimize the overall energy consumption at the mobile terminal side. To this end, we first propose a D2D multicast-based computation offloading framework where the problem is modelled as a combinatorial optimization problem, and then solved using the concepts of from maximum weighted bipartite matching and coalitional game. Note that our proposal considers the delay constraint for each mobile user as well as the battery level to guarantee fairness. To gauge the effectiveness of our proposal, we simulate three typical interactive components. Simulation results show that our algorithm can significantly reduce the energy consumption, and guarantee the battery fairness among multiple users at the same time. We then extend the D2D offloading to hybrid offloading with social relationship consideration. In this context, we propose a hybrid multicast-based task execution framework for mobile edge computing, where a crowd of mobile devices at the network edge leverage network-assisted D2D collaboration for wireless distributed computing and outcome sharing. The framework is social-aware in order to build effective D2D links [...]
Amamou, Ahmed. "Isolation réseau dans un datacenter virtualisé". Paris 6, 2013. http://www.theses.fr/2013PA066343.
Pełny tekst źródłaThis thesis is intended to meet the expectations of the scientific community and the needs of Cloud operators on network insolation in a virtualized datacenter. It focuses on the layer 2 scaling in order to better identify the locks and the opportunities on the modern virtualized datacenter networks. First, it presents a new algorithm for dynamic bandwidth allocation at the physical nodes in order to overcome the problem of internal denial of service attacks while respecting all tenants SLA. Second, it uses an adaptation of TRILL (RFC 6325) switches, called RBridge on physical nodes within a virtualized data center, thus enabling to address the layer 2 scalability problems. Finally, it proposes a new mechanism called VNT (Virtual Netwotk over TRILL), allowing flexible logical networks creation. This mechanism, which includes a new identifier VNI (Virtual Network Identifier), allows the coexistence of more than 16 million logical networks within the same physical network
Mazouzi, Houssemeddine. "Algorithmes pour le déchargement de tâches sur serveurs de périphérie". Thesis, Paris 13, 2019. http://www.theses.fr/2019PA131076.
Pełny tekst źródłaComputation offloading is one of the most promising paradigm to overcome the lack of computational resources in mobile devices. Basically, it allows the execution of part orall of a mobile application in the cloud. The main objective is to reduce both execution time and energy consumption for the mobile terminals. Unfortunately, even if clouds have rich computing and storage resources, they are usually geographically far from mobile applications and may suffer from large delays, which is particularly problematic for mobile applications with small response time requirements. To reduce this long delay, one of the emerging approach is to push the cloud to the network edge. This proximity gives the opportunity to mobile users to offload their tasks to “local” cloud for processing. An Edge Cloud can be seen as small data center acting as a shadow image of larger data centers. This geographical proximity between mobile applications and edge cloud means that the access delay can be greatly reduced, but affects also higher throughput, improved responsiveness and better scalability. In this thesis, we focus on computation offloading in mobile environment (Mobile Edge Computing - MEC), composed of several edge servers. Our goal is to explore new and effective offloading strategies to improve applications performances in both execution time and energy consumption, while ensuring application requirements. Our first contribution is a new offloading strategy in the case of multiple edge servers. Thenwe extend this strategy to include the Cloud. Both strategies have been evaluated theoretically and experimentally by the implementation of an offloading middleware. Finally, we propose a new elastic approach in the case of multitasking applications characterized by a graph of dependencies between tasks
Irisson, Olivier. "L'entreprise en réseau : métaphore informatique et utopie organisationnelle". Paris 9, 2000. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2000PA090019.
Pełny tekst źródłaWestrelin, Roland. "Propositions autour de l'architecture logicielle des interfaces réseau programmables". Lyon 1, 2001. http://www.theses.fr/2001LYO10178.
Pełny tekst źródłaTricot-Censier, Pascal. "Étude et réalisation d'une passerelle entre un réseau MIL1553 et un réseau ETHERNET : implantation du réseau homogène OS9NET et du réseau hétérogène TCP/IP sur le système d'exploitation temps réel OS-9/68000". Paris 11, 1989. http://www.theses.fr/1989PA112241.
Pełny tekst źródłaFreiderikos, Vasilis. "Architectures autonomiques pour le réseau local domestique". Paris 6, 2009. http://www.theses.fr/2009PA066428.
Pełny tekst źródłaBalaï, Christine. "L'impact sur l'Administration des systèmes de communication par réseau". Paris 1, 1995. http://www.theses.fr/1995PA010272.
Pełny tekst źródłaCarpentier, Mathieu. "Classification fine par réseau de neurones à convolution". Master's thesis, Université Laval, 2019. http://hdl.handle.net/20.500.11794/35835.
Pełny tekst źródłaArtificial intelligence is a relatively recent research domain. With it, many breakthroughs were made on a number of problems that were considered very hard. Fine-grained classification is one of those problems. However, a relatively small amount of research has been done on this task even though itcould represent progress on a scientific, commercial and industrial level. In this work, we talk about applying fine-grained classification on concrete problems such as tree bark classification and mould classification in culture. We start by presenting fundamental deep learning concepts at the root of our solution. Then, we present multiple experiments made in order to try to solve the tree bark classification problem and we detail the novel dataset BarkNet 1.0 that we made for this project. With it, we were able to develop a method that obtains an accuracy of 93.88% on singlecrop in a single image, and an accuracy of 97.81% using a majority voting approach on all the images of a tree. We conclude by demonstrating the feasibility of applying our method on new problems by showing two concrete applications on which we tried our approach, industrial tree classification and mould classification.
Le, Crosnier Hervé. "Réseau, bibliothèques et documents numériques : architecture informatique et construction sociale". Habilitation à diriger des recherches, Université de Caen, 2007. http://tel.archives-ouvertes.fr/tel-00204139.
Pełny tekst źródłaAvec le développement accéléré du numérique et des réseaux, nous sommes les témoins d'un basculement fantastique des activités humaines, qui porte sur l'expression de la culture et de la communication, la transformation des processus industriels, les relations inter-personnelles, les activités de travail et de loisir des individus, les conditions d'exercice de la démocratie.
En moins d'une vingtaine d'années, le nombre et la puissance des ordinateurs mis dans les mains des individus a explosé, offrant aux personnes et aux groupes une capacité de traitement inimaginable auparavant. Leur couplage avec l'interconnexion des réseaux a bousculé la donne culturelle, relationnelle, économique, politique, géopolitique, éducative, sociale, médiatique....
La maîtrise de techniques symboliques (traitement d'images, stockage de fichiers numériques, usage du réseau comme ressource d'information, recherche documentaire, transcodage de la musique, écriture et publication personnelle) s'est répandue comme une traînée de poudre dans le monde entier.
Les tranches d'âge concernées se sont élargies en quelques années. La jeunesse et plus encore l'adolescence faisant un large usage des médiations techniques dans sa sociabilité et son apprentissage personnel. Le troisième âge découvre avec intérêt les techniques numériques, de l'appareil photo au mail, qui les gardent en contact avec leur descendance. Les différences d'usage entre les sexes se réduisent, et le travail des groupes de femmes pour utiliser la technologie comme un outil d'égalité et de libération porte des fruits dans tous les types de communautés, notamment dans les pays en développement.
Les divers réseaux et pratiques immatérielles convergent de plus en plus vite vers un réseau ubiquitaire, mêlant intimement les activités de communication, de production symbolique (culture, connaissance et divertissement) et de diffusion. Les terminaux se diversifient, se font mobiles (baladeurs, ordinateurs portables, PDA, téléphones mobiles nouvelle génération...) et s'incrustent dans toutes les activités (travail, culture, loisir, vie quotidienne).
Les principes d'individualité, de vie privée, d'autonomie et même de citoyenneté ne sont plus des qualités intrinsèques aux personnes, mais ressortent de l'émergence de " technologies de la personnalité " et de systèmes d'exposition et de gestion de la personnalité (réseaux sociaux, systèmes d'identification, auto-publication, partage d'environnements culturels ou de jeux, mondes virtuels...).
Le " système nerveux " de l'économie mondiale repose sur ces échanges immatériels accrus, sur les formes nouvelles de production qu'ils permettent, et sur la valorisation et la monétarisation des activités de connaissance, de communication, d'éducation et d'échange. Ces événements technologiques accompagnent et rendent possibles, ou imaginables, d'autres bouleversements dans l'organisation du monde, souvent regroupés sous le terme de " mondialisation " d'une part et de " société de l'information " de l'autre.
Ces bouleversements massifs et en profondeur méritent une attention particulière de la recherche, afin d'analyser ce phénomène au moment même de son bouillonnement, et d'en dégager des principes, des concepts et des grilles d'analyse qui permettent :
- de proposer de nouvelles applications, protocoles et architectures, d'une part pour les sciences de l'ingénieur ;
- de replacer les pratiques sociales, économiques et culturelles qui se cristallisent et se recomposent dans le réseau et le numérique, au sein du fil global de l'histoire et des données de long terme ;
- de repérer les fractures qui se constituent, afin que les sciences humaines et sociales puissent jouer un rôle éclairant pour les citoyens et les acteurs politiques et économiques.
[...] et les derniers mots de la conclusion
Les questions du domaine public et des biens communs de l'information, parce qu'elles permettent d'imaginer une société dans laquelle la transmission et le partage des connaissances serait un moment essentiel de la socialisation et de la vie collective me semblent des questions centrales, qu'il faut encore polir et repolir sur le métier de la recherche sur le document numérique et les réseaux.
Le numérique nous apporte des promesses inégalées de coopération et d'extension de la culture et de la connaissance. Comment permettre à tous les habitants de la planète d'en profiter ? Quels verrous faut ils ouvrir ? Quels ressorts de rêve et d'utopie peuvent être remontés pour que se libère une énergie libératrice ? Comment les réflexions techniques peuvent-elles accompagner un projet social mondial ?
Le chercheur, l'intellectuel et le citoyen sont convoqués pour travailler la compréhension de cet univers du numérique qui irrigue et transforme si profondément nos sociétés. Et faire coopérer les solutions techniques, juridiques, sociales et organisationnelles pour ouvrir des espaces publics mondiaux nouveaux. Ici et maintenant.
Pierre, Xavier. "Utilisation du réseau informatique internet en médecine générale en France". Bordeaux 2, 1998. http://www.theses.fr/1998BOR2M092.
Pełny tekst źródłaBaud, Loïc. "ROSA, un réseau de recouvrement adaptable, extensible et auto-organisant". Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00006101.
Pełny tekst źródłaThe works presented in this thesis take place within the context of the overlay network. An overlay network is a network built on top another network. To each node of the overlay network corresponds a node of the underlying network. These overlay networks have been popularized with the rise of the peer-to-peer networks (that belong to a sub-class of the overlay networks) in the years 2000. There exists many kinds of overlay networks, some are scalable, some ensure a resilient topology, some offers a reliable routing service, etc. But none of the existing overlay network are adaptable to different kind of covered network and propose a large set of services. Any existing overlay network is only dedicated to a particular task. One can imagine an overlay network that could be deployed astride many different kind of underlying network and not dedicating to only a particular task. My thesis aims to define the basis and develop such an overlay network
Saint, Laurent-Kogan Anne-France de. "Informatique en réseau et dynamique des usages : le cas Ouest-France". Rennes 2, 1998. http://www.theses.fr/1998REN20027.
Pełny tekst źródłaWe illustrate in this thesis the complexity of the relationship between technique and social environnement. Our research problematic place on the transdisciplinary of the information and communication sciences (ICS). Our theoritical framework is based on the works of the sociology of uses inside the ICS, of the sociology of innovation and of the labor sociology. We adopted a monographic method centered on one firm of the press : Ouest-France. We analyse the uses of net-connected computers by two different local editorial staff to understand the relationship between technique and social. In a first time, we restored these uses in their contexte. Indeed, the uses place on the ordinary work practices, but, to them understand we have to describe the last technological mutation. At this period, a specific relationship between technique and social is found, but, to it understand, we have to describe the historical contexte. Then, the analysis of uses is based on an ethnographic observation. Computers have transformed some trades and the net confuses the frontieres between professions. But, the analysis of uses show that the social building of professionnal interests, and the professionnal culture resist to the technical prescriptions. The technique can not, alone, transformes the professionnel organisation in an industrial sector. Nevertheless, the protentialities of transformation that come from the growing diffusion of computers, render this equilibrium very fragile
Zhang, Zhen. "Détection des pannes franches et reconfiguration automatique dans un micro-réseau intégré sur puce". Paris 6, 2011. http://www.theses.fr/2011PA066430.
Pełny tekst źródłaBiot, Jean-Pierre. "Un système d'informations réparties sur un réseau local à diffusion". Nice, 1988. http://www.theses.fr/1988NICE4201.
Pełny tekst źródłaLetellier, Laurent. "Synthèse d'images temps réel sur réseau linéaire de processeurs SIMD : algorithmes et architectures". Toulouse, INPT, 1993. http://www.theses.fr/1993INPT143H.
Pełny tekst źródłaBegriche, Youcef. "Etat de renouvellement spatial et application sur un réseau cylindrique". Paris 5, 1988. http://www.theses.fr/1988PA05H028.
Pełny tekst źródłaWe study models for spatial repartition of ill individues (individues are human from a population or cells in a tissue); we introduce models which are more natural and more convenient for physiologists than the models existing in the literature: the probability that an individue x is ill only depends on nearest ill individues. We pay a special attention to the case, where the set of localizations is a cylinder, in view of application to the propagation of varicose on human vein
Dhaenens, Clarisse. "Optimisation d'un réseau de production et de distribution". Grenoble INPG, 1998. http://tel.archives-ouvertes.fr/tel-00004887.
Pełny tekst źródłaBoite, Julien. "Acheminement différencié et auto-adaptatif des flux réseau pour la qualité de livraison des serivces". Troyes, 2012. http://www.theses.fr/2012TROY0032.
Pełny tekst źródłaCommunication networks allow accessing a wide and diversified range of services that took a prominent place in our activities. The solicitation of a service generates a set of flows. The network is responsible for routing and forwarding them. Some flows are subject to particular criticality or quality constraints that must be met to ensure that services are delivered in accordance with users’ growing expectations. The network infrastructure combines the various means to reach the elements involved in the delivery of services. The unification of these means is a wealth which we should take profit of better than we do now. In this thesis, we investigate how to make the network able to exploit all these resources in a timely manner by automatically forwarding flows according to their constraints and network status. It requires to monitor the performance offered by different paths to state on their ability to deal with the respective needs of flows. Then, the network must be configured dynamically to set up this differentiated and flexible forwarding of flows. We propose mechanisms for performing measurements and dynamic forwarding to integrate adaptive flow processing functionalities within the network. We instantiate these mechanisms to deal with an adaptive gateway selection in heterogeneous wireless mesh networks. We also investigate the instability problem that can occur with adaptive routing in a large overlay network. We assess the extent of this problem and propose a mechanism that reduces this instability
Hertzog, Patrick. "Gestion des réseaux locaux industriels : application au réseau". Nancy 1, 1994. http://www.theses.fr/1994NAN10047.
Pełny tekst źródłaSahin, Henriette Louise. "Contribution à l'étude du réseau numérique à intégration de services : interconnexion réseau local et autocommutateur privé (PABX) au réseau numérique à intégration de services". Toulouse, INPT, 1988. http://www.theses.fr/1988INPT011H.
Pełny tekst źródłaCournoyer, Benoit. "Réalisation d'un récepteur mimo multi usagers avec sélection d'un sous-réseau d'antennes". Thesis, Université Laval, 2006. http://www.theses.ulaval.ca/2006/24103/24103.pdf.
Pełny tekst źródłaXydas, Ioannis. "Aide à la surveillance de l’application d’une politique de sécurité dans un réseau par prise de connaissance d’un graphe de fonctionnement du réseau". Limoges, 2007. https://aurore.unilim.fr/theses/nxfile/default/ba3a6a50-5708-4f1a-9d00-dca7fa1469cd/blobholder:0/2007LIMO4006.pdf.
Pełny tekst źródłaIn this thesis we study the possibility of applying visualization and visual analytics in the context of data analysis for network security. In particular, we studied Internet web security and by using an “intelligent” visual representation of web attacks we extracted knowledge from a network operation graph. To achieve this goal we designed and developed an intelligent prototype system. This system is a surveillance aid for the security and web analyst, offering him/her a user friendly visual tool to detect anomalies in web requests by monitoring and exploring 3D graphs, to understand quickly the kind of undergoing attack by means of colours and the ability to navigate into the web request payload, of either normal or malicious traffic, for further analysis and appropriate response. The fundamental parts of such a system are Artificial Intelligence and Visualization. A hybrid expert system such as an Evolutionary Artificial Neural Network proved to be ideal for the classification of the web attacks
Chaabane, Saif. "Guide de développement d'un réseau social à visée pédagogique". Thesis, Université Laval, 2014. http://www.theses.ulaval.ca/2014/30579/30579.pdf.
Pełny tekst źródłaSocial networks know growing popularity that is attracting more and more education world. They are virtual spaces that enrich the educational experience. A variety of software was proposed to create social networks. But, the literature does not indicate how to proceed to develop educational social networks. To this end, a comparison of available tools to create social network was made and a guide for the development of such networks was proposed. This guide is generic and presents, in concise and well-detailed steps, the approach to be undertaken for developing educational social networks. It can be used independently of the objectives of setting up a given educational social network, and independently of the specific needs of its users. In order to illustrate the use of the guide, we have developed the educational social network of the University of Koudougou.
Yonaba, Harouna. "Modélisation hydrologique hybride : réseau de neurones - modèle conceptuel". Thesis, Université Laval, 2009. http://www.theses.ulaval.ca/2009/26583/26583.pdf.
Pełny tekst źródłaRafamantanantsoa, Fontaine. "Etude des performances d'un serveur web et d'un réseau local sans fil utilisant les techniques neuronales". Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2009. http://tel.archives-ouvertes.fr/tel-00725472.
Pełny tekst źródłaJouffroy, Guillaume. "Contrôle oscillatoire par réseau de neurones récurrents". Paris 8, 2008. http://www.theses.fr/2008PA082918.
Pełny tekst źródłaIn the control field, most of the applications need a non-oscillatory continuous control. This work focuses instead on controllers with recurrent neural networks (RNN) which generate a periodic oscillatory control. The purpose of the present work is to study stochastic optimisation methods which can be used to discover the parameters of a network so that it generates a cyclic input. First we take a look at the knowledge about biological oscillators. Tthen we describe the mathematical tools to be able to guarantee the stability oscillators. The potential of RNN, especially applied to dynamical systems being still poorly used, we propose for each method, a general detailed matrix formalization and we precise the computational complexity of the methods. We validate each method using a simple example of oscillator, and we demonstrate analytically the stability of the resulting oscillator, but also how it is robust to parameters perturbations. We then compare these different methods with these criteria and the speed of convergence. We finish this thesis with an illustration, where we take all the steps of the construction of an oscillatory neural controller, to control the axis of direction of a particular vehicle. This will let us discuss how realistic is the use of recurrent neural networks in the field of control, and propose interesting questions
Pujol, Hubert. "Réseau d'interconnexion haut débit pour les architectures parallèles connexionnistes". Paris 11, 1994. http://www.theses.fr/1994PA112192.
Pełny tekst źródłaMokhtari, Myriam. "Réseau neuronal aléatoire : applications à l'apprentissage et à la reconnaissance d'images". Paris 5, 1994. http://www.theses.fr/1994PA05S019.
Pełny tekst źródłaKara, Reda. "Une Approche modulaire du réseau de neurones CMAC pour la commande d'un système robot-vision". Mulhouse, 2002. http://www.theses.fr/2002MULH0704.
Pełny tekst źródłaThe work of this thesis investigates artificial neural networks capabilities to estimate robotic functions, and their performances as controllers. We propose an adaptive visual servoing scheme based on the CMAC ("Cerebellar Model Articulation Controller") network. The CMAC network is thus well suited for robot control but in practice there are two drawbacks: its output is "discrete" and its precision depends on its size. Thus, we have developed two modular neural : the HCMAC ("Hierarchical CMAC") and the AL_CMAC ("Adaptive Linear CMAC"). These two networks are a combination of networks of small size. The efficiency of the HCMAC and AL_CMAC neuro-controller is validated through visual servoing experiments with a three degrees of freedom robot arm and with a two camera vision system. Visual servoing experiments consist in positioning tasks and in tracking mobile objects. The performances are compared to other neuro-controllers like CMAC and SSOM ("Supervised Self-Organizing Maps") networks
Zhang, Jie. "Diagnostic multi-expert : extension de l'approche système expert organisé en réseau du système SUPER". Compiègne, 1991. http://www.theses.fr/1991COMPD405.
Pełny tekst źródłaDe, Palma Gianfranco. "Etude et réalisation d'un disjoncteur statique limiteur pour réseau alternatif 660 volts - 100 A". Lyon, INSA, 1992. http://www.theses.fr/1992ISAL0010.
Pełny tekst źródłaThis thesis presents a study and the realization of a static-circuit-breaker for the 660 Volts/lOO A alternating network. The choices adopted during conception are presented and justified. The solution retained consists of paralleling sorne bidirectionnal static switching modules, each characterized by a 100 A handling current. We have optimized our static switch for a static-breaker application. Thus, our static switch is characterized by a low voltage-droop. The controlled-to-nominal-current is egal to 10. There is a high surge current capability and a low leakage current in the off-state. The solution retained allows a reasonnable cost
Rouissi, Jalel. "L'évaluation des effets de réseau en bibliothèques : pour une meilleure prise en compte des coûts et avantages qualitatifs de la coopération". Lyon 2, 2001. http://theses.univ-lyon2.fr/documents/lyon2/2001/rouissi_j.
Pełny tekst źródłaGreff, Florian. "SDRN : réseau maillé temps réel dynamique défini par logiciel". Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0076/document.
Pełny tekst źródłaWe are studying a new kind of embedded real-time mesh network. Mesh networking of the components of embedded systems reconciles their real-time constraints with the new application needs in terms of bandwidth and tight interactions. The plurality of communication paths results in increased flexibility, resilience, scalability and load balancing characteristics. However, this requires the ability to dynamically allocate network resource with respect to the needs of running applications. Our approach is to allow applications to make online real-time flow resource requests and consequently allot network resources according to these requirements. To this end, we have designed the Software-Defined Real-time Networking (SDRN) architecture. It addresses flow isolation, timing analysis, routing, fault tolerance, as well as the interfaces with the application layer and the lower layers of the system. It also allows any module to be replaced without interfering with the remainder of the architecture. It has been validated via an implementation on an in-silicon RapidIO platform. This thesis describes our research on the SDRN architecture. It also proposes an original method for experimenting on embedded networks, ERICA. The ERICA framework automatically generates all what is needed to conduct a network experiment in a selected environment (such as a simulator or a testbed), with both physical and simulated aspects. Hence, it allows the researcher to perform a high-level thinking of the whole experimentation process and to reuse applications and experiment designs from an experimentation stack to another
Louge, Robert. "Un système de gestion réseau hétérogène en milieu industriel". Toulouse 3, 1992. http://www.theses.fr/1992TOU30158.
Pełny tekst źródłaFernandez, Arriaga Norma Veronica. "L'enseignement à distance au Mexique : Edusat et réseau scolaire". Grenoble 3, 2004. http://www.theses.fr/2004GRE39001.
Pełny tekst źródłaMamet, Jean-Philippe. "Evaluation d'un réseau télé-informatique de surveillance des maladies transmissibles, exemple de la listériose". Paris 5, 1993. http://www.theses.fr/1993PA05P102.
Pełny tekst źródłaTay, Yong Haur. "Reconnaissance de l'écriture manuscrite hors-ligne par réseau de neurones artificiels et modèles de Markov cachés". Nantes, 2002. http://www.theses.fr/2002NANT2106.
Pełny tekst źródłaKhouaja, Youssef. "Une méthode de contrôle par le réseau appliquée à la gestion hiérarchique de la mobilité IPv6". Rennes 1, 2002. http://www.theses.fr/2002REN10114.
Pełny tekst źródłaKessab, Achraf. "Topologie et dimensionnement d'un réseau ad hoc maritime couplé avec un réseau satellitaire". Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0003.
Pełny tekst źródłaIn the first part of this thesis, we tackle the initialization of the network in this hierarchical context. We propose a statistical model enabling a network designer to perceive the requirements in terms of equipments, channel bandwidth, antenna configurations, antenna radiation pattern, achievable data rates for instance. In order to guarantee fully connected MANET, we introduce an analytical tool to estimate the required inter-staff-ships and inter-shipmasters coverage radii. Then we study the multi-hop end-to-end communications and we propose several routing protocols to enhance the delays. Afterwards, we focus on the contribution of the satellite backhaul with a comparative study qualifying the needs in Hybrid Stations “HSs” and a strategy to access to these gateways. In a second part, we emphasis on the radio resource outage occurrence and the dimensioning matter to optimize the allocated bandwidth to the network. We investigate stochastic geometry tools to provide an analytical model enabling to foresee the amount of required radio resources by the active nodes with a certain Quality of Service “QoS” and several Multiple Inputs Multiple Outputs “MIMO” antenna configurations in the maritime context. We consider first the centralized access scheme where all communications are performed via the shipmasters that are in charge of the radio resource management. Then we focus on the distributed access scheme with Aloha Medium Access Control “MAC” protocol where nodes are authorized to access to the shared bandwidth arbitrarily and unilaterally. Simulation and numerical results are provided to evaluate the performances in terms of required bandwidth, aggregate capacity
Delisle, Simard Alexandre. "Étude de sauts de phase distribués sur un réseau de Bragg à pas linéairement variable". Thesis, Université Laval, 2009. http://www.theses.ulaval.ca/2009/26524/26524.pdf.
Pełny tekst źródłaBrière, Matthieu. "Flot de conception hiérarchique d'un système hétérogène : Prototypage virtuel d'un réseau d'interconnexion optique intégré". Ecully, Ecole centrale de Lyon, 2005. http://bibli.ec-lyon.fr/exl-doc/mbriere.pdf.
Pełny tekst źródłaDue to ever-increasing integration density , systems on chip will soon be composed of several tens of IP blocks (processor cores, memory blocks, specific digital functions). Global communication throughput between these blocks will reach hundreds of gigabits per second. It will not be possible to achieve this troughput without moving away from traditional network architectures and traditional design methods. Integrated optics is a possible alternative which may overcome the physical limitations of traditional interconnect technology. This work aims to evaluate the achievable performance metrics (throughput, latency, power consumption) of an ONoC (Optical Network on Chip) and to compare it to those of a classical NoC
Devesa, Nathalie. "Proposition d'un schéma d'évaluation parallèle du langage fonctionnel FP sur un réseau de processus". Lille 1, 1990. http://www.theses.fr/1990LIL10010.
Pełny tekst źródłaAssens, Christophe. "La dynamique des complémentarités et des conflits dans un réseau d'entreprises". Paris 9, 1998. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1998PA090001.
Pełny tekst źródłaThis thesis deals about mechanisms of regulation and development in a network organisation. The aim of the research is to observe and analyze interaction process between units. In this perspective, we choose to study a network of enterprises in the public utilities sector. Based on the case method, our observations point out three kind of interaction process in this organisation : the collaboration between partners and / or competitors ; the subcontracting between suppliers and customers ; the competition between competitors. According to this data, the research shows the coexistence of collaboration and conflict in the same network. By this way, we go beyond normalised approaches that consider the network dynamic through the consensus or the conflict perspective
Baille, Fabien. "Algorithmes d'approximation pour des problèmes d'ordonnancement bicritères : application à un problème d'accès au réseau". Evry-Val d'Essonne, 2005. http://www.theses.fr/2005EVRY0018.
Pełny tekst źródłaInspired by a network access problem, we study the following problem. In K identical and independent machines, we have to chedule tasks with release dates and deadlines maximizing simultaneously the number (number of scheduled tasks) and the weight (sum of the weights of the scheduled tasks). We propose generic algorithms (using as sub-routine good mono-criterion algorithms), often arameterisable and having non trivial approximation (or competitive) ratios that are sometimes optimal. We specifically study the following models of tasks : - Sequential tasks and intervals (execution time equal to the difference between the release date and the deadline) - Temporally degradable sequential intervals (the scheduler can shorten the execution time of a task) - Spatially degradable parallel tasks (task can be executed on less machines than requested) - Non degradable parallel tasks
Abderrahim, Mohamed. "Conception d’un système de supervision programmable et reconfigurable pour une infrastructure informatique et réseau répartie". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0119/document.
Pełny tekst źródłaCloud offers compute, storage and network as services. To reduce the offer cost, the operators tend to rely on centralized and massive infrastructures. However, such a configuration hinders the satisfaction of the latency and bandwidth requirements of new generation applications. The Edge aims to rise this challenge by relying on massively distributed resources. To satisfy the operators and the users of Edge, management services similar to the ones that made the success of Cloud should be designed. In this thesis, we focus on the monitoring service. We design a framework to establish a holistic monitoring service. This framework determines a peer-to-peer deployment architecture for the observation, processing, and exposition of measurements. It verifies that this architecture satisfies the functional and quality of service constraints of the users. For this purpose, it relies on a description of users requirement sand a description of the Edge infrastructure.The expression of these two elements can be unified with two languages offered by the Framework. The deployment architecture is determined with the aim of minimizing the compute and network footprint of the monitoring service. For this purpose, the functions are mutualized as much as possible among the different users. The tests we did showed the relevance of our proposal for reducing monitoring footprint with a gain of -28% for the compute and -24% for the network
Georges, Jean-Philippe. "Systèmes contrôlés en réseau : évaluation de performances d'architectures Ethernet commutées". Nancy 1, 2005. http://www.theses.fr/2005NAN10145.
Pełny tekst źródłaIn the field of networked control systems, researches have considerably evolved since Ethernet is more and more used to substitute the traditional industrial local area networks. Even if this choice of Ethernet is justified regarding its intrinsic ability to support all the communications of the enterprise (from office to workshop), it is not suitable to assume the time constraints of distributed control applications. Contrary to the fieldbuses, the non-determinism of the medium access method used by Ethernet does not enable to guarantee strict time constraints. The contribution of this thesis is to define an analytical approach to upper-bound the end-to-end delays in networked control systems which are based on switched Ethernet architectures. Work has focused on the adaptation of the network calculus theory to these specifics environments. Within this framework, this thesis presents the modeling of an IEEE 802. 1D switch as well as a computation method of the end-to-end delays based on the increasing of the traffic burstiness. Several real experiments validate the tightness of the computed bounds. In addition to the performance evaluation, the work has also considered the Classification of Service (IEEE 802. 1D/p) and the optimization of the frames scheduling on Ethernet. Finally, this thesis shows how such a performances evaluation method can be used to scale and optimize the design of switched Ethernet architectures