Дисертації з теми "Constraint networks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Constraint networks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Beaumont, Matthew, and n/a. "Handling Over-Constrained Temporal Constraint Networks." Griffith University. School of Information Technology, 2004. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20041213.084512.
Повний текст джерелаBeaumont, Matthew. "Handling Over-Constrained Temporal Constraint Networks." Thesis, Griffith University, 2004. http://hdl.handle.net/10072/366603.
Повний текст джерелаThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
Institute for Integrated and Intelligent Systems
Full Text
Francisco, Rodriguez Maria Andreina. "Consistency of Constraint Networks Induced by Automaton-Based Constraint Specifications." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-156441.
Повний текст джерелаHassani, Bijarbooneh Farshid. "Constraint Programming for Wireless Sensor Networks." Doctoral thesis, Uppsala universitet, Avdelningen för datalogi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-241378.
Повний текст джерелаProFuN
Draghici, Sorin. "Using constraints to improve generalisation and training of feedforward neural networks : constraint based decomposition and complex backpropagation." Thesis, University of St Andrews, 1996. http://hdl.handle.net/10023/13467.
Повний текст джерелаCraven, Daniel Shawn. "A formal analysis of the MLS LAN : TCB-to-TCBE, Session Status, & TCBE-to-Session Server Protocols /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FCraven.pdf.
Повний текст джерелаVaez, Mohammad-Mehdi. "Nonblocking Banyan-type optical switching networks under crosstalk constraint." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/13401.
Повний текст джерелаChachra, Sumit, and Theodore Elhourani. "RESOURCE ALLOCATION IN SENSOR NETWORKS USING DISTRIBUTED CONSTRAINT OPTIMIZATION." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605299.
Повний текст джерелаSeveral algorithms have been proposed for solving constraint satisfaction and the more general constraint optimization problem in a distributed manner. In this paper we apply two such algorithms to the task of dynamic resource allocation in the sensor network domain using appropriate abstractions. The aim is to effectively track multiple targets by making the sensors coordinate with each other in a distributed manner, given a probabilistic representation of tasks (targets). We present simulation results and compare the performance of the DBA and DSA algorithms under varying experimental settings.
Grigoleit, Mark Ted. "Optimisation of large scale network problems." Thesis, Curtin University, 2008. http://hdl.handle.net/20.500.11937/1405.
Повний текст джерелаComin, Carlo. "Complexity in Infinite Games on Graphs and Temporal Constraint Networks." Doctoral thesis, Università degli studi di Trento, 2017. https://hdl.handle.net/11572/368151.
Повний текст джерелаCraven, Daniel Shawn. "A formal analysis of the MLS LAN: TCB-to-TCBE, Session Status, and TCBE-to-Session Server Protocols." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1448.
Повний текст джерелаThis thesis presents a formal analysis process and the results of applying that process to the MLS LAN: TCB-to- TCBE, Session Status, and TCBE-to-Session Server Protocols. The formal analysis process consists of several distinct stages: the creation of a detailed informal protocol description, analyzing that description to reveal assumptions and areas of interest not directly addressed in the protocol description, the transformation of that description and the related assumptions into a formal Strand Space representation, analyzing that representation to reveal assumptions and areas of interest, and concluding with an application of John Millen's automated Constraint Checker analysis tool to the Strand Space representations under an extremely limited set of conditions to prove certain protocol secrecy properties.
Kabiri, Charles. "On the Performance of Underlay Cognitive Radio Networks with Interference Constraints and Relaying." Doctoral thesis, Blekinge Tekniska Högskola [bth.se], Faculty of Computing - Department of Communication Systems, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00609.
Повний текст джерелаIndrakumar, Selvaratnam. "Towards a constraint-based multi-agent approach to complex applications." Thesis, University of Surrey, 2000. http://epubs.surrey.ac.uk/2095/.
Повний текст джерелаSteck, Harald. "Constraint-based structural learning in Bayesian networks using finite data sets." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962067202.
Повний текст джерелаAli, Murad. "Offline constraint-based routing in OSPF networks : a server based study." Thesis, University West, Department of Technology, Mathematics and Computer Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-1346.
Повний текст джерелаMany of the network applications today are demanding QoS guaranteed paths which the best effort routing protocols e.g. OSPF cannot calculate, because these protocols are topology driven, do not address many of the constraints by these applications and only calculate shortest paths. In this thesis offline constraint based routing is studied for Open Shortest Path First (OSPFv2) protocol single area network and an offline server is proposed for QoS guaranteed routing. The server builds traffic engineering (TE) database and calculates QoS guaranteed paths on behalf of all the routers in that area. The client routers only do best effort routing for normal data flows with no requirement for QoS guaranteed paths. The client routers use NETCONF protocol to download QoS routes from the offline server (OS). The offline server besides calculating QoS paths also reduces congestion and helps in efficiently utilizing the network resources, for example bandwidth.
Dávid, László [Verfasser]. "Algorithms for the constraint-based analysis of metabolic networks / László Dávid." Berlin : Freie Universität Berlin, 2015. http://d-nb.info/1067442243/34.
Повний текст джерелаMarashi, Sayed-Amir [Verfasser]. "Constraint-based analysis of substructures of metabolic networks / Sayed-Amir Marashi." Berlin : Freie Universität Berlin, 2011. http://d-nb.info/1025356144/34.
Повний текст джерелаHelmberg, Christoph, Sebastian Richter, and Dominic Schupke. "A Chance Constraint Model for Multi-Failure Resilience in Communication Networks." Universitätsbibliothek Chemnitz, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-175454.
Повний текст джерелаWANG, YUN. "Application-Specific Quality of Service Constraint Design in Wireless Sensor Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217598398.
Повний текст джерелаMuhammad, Sanusi. "Scalable and network aware video coding for advanced communications over heterogeneous networks." Thesis, Brunel University, 2013. http://bura.brunel.ac.uk/handle/2438/7469.
Повний текст джерелаGrigoleit, Mark Ted. "Optimisation of large scale network problems." Curtin University of Technology, Department of Mathematics and Statistics, 2008. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=115092.
Повний текст джерелаWe then use this information to constrain the network along a bisecting meridian. The combination of Lagrange Relaxation (LR) and a heuristic for filtering along the meridian provide an aggressive method for finding near-optimal solutions in a short time. Two network problems are studied in this work. The first is a Submarine Transit Path problem in which the transit field contains four sonar detectors at known locations, each with the same detection profile. The side constraint is the total transit time, with the submarine capable of 2 speeds. For the single-speed case, the initial LR duality gap may be as high as 30%. The first hybrid method uses a single centre meridian to constrain the network based on the unused time resource, and is able to produce solutions that are generally within 1% of optimal and always below 3%. Using the computation time for the initial Lagrange Relaxation as a baseline, the average computation time for the first hybrid method is about 30% to 50% higher, and the worst case CPU times are 2 to 4 times higher. The second problem is a random valued network from the literature. Edge costs, times, and lengths are uniform, randomly generated integers in a given range. Since the values given in the literature problems do not yield problems with a high duality gap, the values are varied and from a population of approximately 100,000 problems only the worst 200 from each set are chosen for study. These problems have an initial LR duality gap as high as 40%. A second hybrid method is developed, using values for the unused time resource and the lower bound values computed by Dijkstra’s algorithm as part of the LR method. The computed values are then used to position multiple constraining meridians in order to allow LR to find better solutions.
This second hybrid method is able to produce solutions that are generally within 0.1% of optimal, with computation times that are on average 2 times the initial Lagrange Relaxation time, and in the worst case only about 5 times higher. The best method for solving the Constrained Shortest Path Problem reported in the literature thus far is the LRE-A method of Carlyle et al. (2007), which uses Lagrange Relaxation for preprocessing followed by a bounded search using aggregate constraints. We replace Lagrange Relaxation with the second hybrid method and show that optimal solutions are produced for both network problems with computation times that are between one and two orders of magnitude faster than LRE-A. In addition, these hybrid methods combined with the bounded search are up to 2 orders of magnitude faster than the commercial CPlex package using a straightforward MILP formulation of the problem. Finally, the second hybrid method is used as a preprocessing step on both network problems, prior to running CPlex. This preprocessing reduces the network size sufficiently to allow CPlex to solve all cases to optimality up to 3 orders of magnitude faster than without this preprocessing, and up to an order of magnitude faster than using Lagrange Relaxation for preprocessing. Chapter 1 provides a review of the thesis and some terminology used. Chapter 2 reviews previous approaches to the CSPP, in particular the two current best methods. Chapter 3 applies Lagrange Relaxation to the Submarine Transit Path problem with 2 speeds, to provide a baseline for comparison. The problem is reduced to a single speed, which demonstrates the large duality gap problem possible with Lagrange Relaxation, and the first hybrid method is introduced.
Chapter 4 examines a grid network problem using randomly generated edge costs and weights, and introduces the second hybrid method. Chapter 5 then applies the second hybrid method to both network problems as a preprocessing step, using both CPlex and a bounded search method from the literature to solve to optimality. The conclusion of this thesis and directions for future work are discussed in Chapter 6.
Huang, Shao-shan Carol. "A constraint optimization framework for discovery of cellular signaling and regulatory networks." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/65772.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references.
Cellular signaling and regulatory networks underlie fundamental biological processes such as growth, differentiation, and response to the environment. Although there are now various high-throughput methods for studying these processes, knowledge of them remains fragmentary. Typically, the majority of hits identified by transcriptional, proteomic, and genetic assays lie outside of the expected pathways. In addition, not all components in the regulatory networks can be exposed in one experiment because of systematic biases in the assays. These unexpected and hidden components of the cellular response are often the most interesting, because they can provide new insights into biological processes and potentially reveal new therapeutic approaches. However, they are also the most difficult to interpret. We present a technique, based on the Steiner tree problem, that uses a probabilistic protein-protein interaction network and high confidence measurement and prediction of protein-DNA interactions, to determine how these hits are organized into functionally coherent pathways, revealing many components of the cellular response that are not readily apparent in the original data. We report the results of applying this method to (1) phosphoproteomic and transcriptional data from the pheromone response in yeast, and (2) phosphoproteomic, DNaseI hypersensitivity sequencing and mRNA profiling data from the U87MG glioblastoma cell lines over-expressing the variant III mutant of the epidermal growth factor receptor (EGFRvIII). In both cases the method identifies changes in diverse cellular processes that extend far beyond the expected pathways. Analysis of the EGFRVIII network connectivity property and transcriptional regulators that link observed changes in protein phosphorylation and differential expression suggest a few intriguing hypotheses that may lead to improved therapeutic strategy for glioblastoma.
by Shao-shan Carol Huang.
Ph.D.
Xiong, Lixiang. "Scheduling in packet switches with relaxed constraint." School of Electrical, Computer and Telecommunications Engineering - Faculty of Informatics, 2004. http://ro.uow.edu.au/theses/372.
Повний текст джерелаGuziolowski, Carito. "Analysis of Large-Scale Biological Networks with Constraint-Based Approaches over Static Models." Phd thesis, Université Rennes 1, 2010. http://tel.archives-ouvertes.fr/tel-00541903.
Повний текст джерелаLarhlimi, Abdelhalim [Verfasser]. "New concepts and tools in constraint-based analysis of metabolic networks / Abdelhalim Larhlimi." Berlin : Freie Universität Berlin, 2009. http://d-nb.info/1023579944/34.
Повний текст джерелаKocagoncu, Ece. "Dynamic speech networks in the brain : dual contribution of incrementality and constraints in access to semantics." Thesis, University of Cambridge, 2017. https://www.repository.cam.ac.uk/handle/1810/270309.
Повний текст джерелаFu, Ser-Geon. "Genetic and evolutionary protocols for solving distributed asymmetric constraint satisfaction problems." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Spring%20Dissertations/FU_SER-GEON_10.pdf.
Повний текст джерелаLu, Wei. "Integer Programming-based Methods for Computing Minimum Reaction Modifications of Metabolic Networks for Constraint Satisfaction." 京都大学 (Kyoto University), 2015. http://hdl.handle.net/2433/199436.
Повний текст джерелаManaf, Afwarman 1962. "Constraint-based software for broadband networks planninga software framework for planning with the holistic approach /." Monash University, Dept. of Electrical and Computer Systems Engineering, 2000. http://arrow.monash.edu.au/hdl/1959.1/8163.
Повний текст джерелаServín, Meneses Christian. "An optimization approach for the cascade vulnerability problem." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Повний текст джерелаAravena, Andrés. "Probabilistic and constraint based modelling to determine regulation events from heterogeneous biological data." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00922346.
Повний текст джерелаKoker, Ezgi. "Chance Constrained Optimization Of Booster Disinfection In Water Distribution Networks." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613640/index.pdf.
Повний текст джерелаManaf, Afwarman 1962. "Constraint-based software for broadband networks planning : a software framework for planning with the holistic approach." Monash University, Dept. of Electrical and Computer Systems Engineering, 2000. http://arrow.monash.edu.au/hdl/1959.1/7754.
Повний текст джерелаJenkins, Glenn Llewellyn. "Evolved neural network approximation of discontinuous vector fields in unit quaternion space (S³) for anatomical joint constraint." Thesis, University of South Wales, 2007. https://pure.southwales.ac.uk/en/studentthesis/evolved-neural-network-approximation-of-discontinuous-vector-fields-in-unit-quaternion-space-s3-for-anatomical-joint-constraint(f375e712-038c-4a78-862a-944c0e36e360).html.
Повний текст джерелаPsujek, Sean Thomas. "The Role of Developmental Bias in a Simulated Evo-devo System." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1232655232.
Повний текст джерелаLukachan, George. "Scalable energy-efficient location aided routing (SELAR) protocol for wireless sensor networks." [Tampa, Fla] : University of South Florida, 2005. http://purl.fcla.edu/usf/dc/et/SFE0001366.
Повний текст джерелаBrettner, Leandra M., and Joanna Masel. "Protein stickiness, rather than number of functional protein-protein interactions, predicts expression noise and plasticity in yeast." BioMed Central, 2012. http://hdl.handle.net/10150/610103.
Повний текст джерелаChoi, Gi Wan. "Low-complexity and power-efficient wireless cooperative relay networks with enhanced reliability." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47721.
Повний текст джерелаLang, Philipp Sebastian [Verfasser], and Erwin [Akademischer Betreuer] Frey. "Reptation in entangled polymer networks : a simulational study of the significance of constraint release for reptation / Philipp Sebastian Lang. Betreuer: Erwin Frey." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2015. http://d-nb.info/1104698013/34.
Повний текст джерелаPiesker, Björn. "Constraint-basierte Generierung realitätsnaher Eisenbahnnetze." Master's thesis, Universität Potsdam, 2007. http://opus.kobv.de/ubp/volltexte/2007/1532/.
Повний текст джерелаThis work deals with the development of an application, which generates infrastructure data of railway networks. The focus of this work concentrates on the generation process of topological information. As input for the application a characterization of the intended railway network is given as attributes, which are handled as constraints in the generation process. To satisfy these restrictions constraint programming, a special programming paradigm, which is able to search efficently consistent solutions, is applied. In particular, the use of so-called global constraints improves the computation. For that reason the role of constraint-programming in modelling and implementing these application is discussed in more detail.
Andrade, Tales Pinheiro de. "Interações gênicas usando redes booleanas limiarizadas modeladas como um problema de satisfação de restrições." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-05062012-150618/.
Повний текст джерелаThe chemical reactions that result in gene expression are complex and not yet fully understood. It is known that genes send, receive and process information to form a complex network of com- munication, but the architecture and dynamics of these networks are not fully known. Thus, one major problem is to determine how genes are linked within the cell. This process of determining the relationship between genes is known as inference of genetic networks. One way to represent the relationship between genes is to use mathematical and computer models of genetic networks. In particular, one of the models of great interest are Boolean Networks (BN), in which genes can take two states, active or inactive, if they are, respectively, expressed or not. These states may vary over time, depending on how genes are related. Our interest is in studying a case of this particular model, known as thresholded Boolean networks, where only one class of Boolean functions is used to build the GNs. To infer the thresholded Boolean networks, we use an algorithm that consists of two steps. First, we use the framework of Constraint Satisfaction Problem (CSP) to infer sets of solutions consistent with a time series of a given set of genes. Then analyze the dynamic behavior of the solutions, filtering sets of solutions with interest for practical tests in the laboratory. Using the framework of the CSP, we constructed a solver, using the library Gecode, 2 for in- ference of consistent networks, using as input a time series arising from microarrays data. Then, by simulating the dynamics of a sample of networks found in the previous step, we were able to determine some interesting constraints to filter the set of networks. We apply our method to three datasets: two artificial, and for validation, we use a time series of an artificial network known from literature. Thus we were able to infer genetic networks sets of possible interest for laboratory tests.
Tunc, Ilker. "Epidemic models on adaptive networks with network structure constraints." W&M ScholarWorks, 2013. https://scholarworks.wm.edu/etd/1539623618.
Повний текст джерелаLi, Ruogu. "Principles and Methods of Adaptive Network Algorithm Design under Various Quality-of-Service Requirements." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1354642003.
Повний текст джерелаBit-Monnot, Arthur. "Temporal and Hierarchical Models for Planning and Acting in Robotics." Phd thesis, Toulouse, INPT, 2016. http://oatao.univ-toulouse.fr/17704/1/Arthur%20Bit-Monnot.pdf.
Повний текст джерелаComin, Carlo. "Complexité dans les Jeux Infinis sur les Graphes et les Réseaux de Contraintes Temporelles." Thesis, Paris Est, 2017. http://www.theses.fr/2017PESC1061/document.
Повний текст джерелаThis dissertation deals with a number of algorithmic problems motivated by automated temporal planning and formal verification of reactive and finite state systems. We focused on game theoretical methods to obtain novel insights, improved complexity bounds, and faster algorithms for the following models: Hyper Temporal Networks, Conditional Simple/Hyper Temporal Networks, Update Games, Muller McNaughton Games, and Mean Payoff Games
Gong, Shujia. "Solutions to constrained path computation in multi-layer networks." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2932.
Повний текст джерелаTitle from PDF t.p. (viewed Jan. 18, 2008). Thesis director: Bijan Jabbari Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical and Computer Engineering. Vita: p. 113. Includes bibliographical references (p. 109-112). Also available in print.
Trick, Michael Alan. "Networks with additional structured constraints." Diss., Georgia Institute of Technology, 1987. http://hdl.handle.net/1853/23371.
Повний текст джерелаNikbakht, Homa. "Networks with mixed-delay constraints." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT046.
Повний текст джерелаModern wireless communication networks have to accommodate different types of data traffic with different latency constraints. In particular, delay-sensitive video-applications represent an increasing portion of data traffic. Modern networks also have to accommodate high total data rates, which they can accomplish for example with cooperating terminals or with helper relays such as drones. However, cooperation typically introduces additional communication delays, and is thus not applicable to delay-sensitive data traffic.This thesis focuses on interference networks with mixed-delay constraints and on system architectures where neighbouring transmitters and/or neighbouring receivers can cooperate. In such systems, delay-sensitive messages have to be encoded and decoded without further delay and thus cannot benefit from available cooperation links.We propose various coding schemes that can simultaneously accommodate the transmission of both delay-sensitive and delay-tolerant messages. For the proposed schemes we analyze the multiplexing gains (MG) they achieve over Wyner's soft hand-off network, Wyner's symmetric network, the hexagonal network and the sectorized hexagonal network. For Wyner's soft hand-off network and Wyner's symmetric network, we also provide tight information-theoretic converse results and thus establish the exact set of MG pairs that can simultaneously be achieved for delay-sensitive and delay-tolerant data. These results demonstrate that when both transmitters and receivers cooperate and the cooperation rates are sufficiently large, it is possible to achieve the largest MG for delay-sensitive messages without penalizing the maximum sum MG of both delay-sensitive and delay-tolerant messages. In contrast, under our proposed schemes, the sending of delay-sensitive data in hexagonal models decreases the maximum sum MG. This penalty vanishes when we consider the sectorized hexagonal network where each cell is divided into three non-interfering sectors by employing directional antennas at the base stations.We further propose similar coding schemes for scenarios with different types of random user activity. We specifically consider two setups. In the first setup, each active transmitter always has delay-tolerant data to send and delay-sensitive data arrival is random. In the second setup, both delay-tolerant and delay-sensitive data arrivals are random. The obtained MG regions show that in the first setup, increasing the delay-sensitive MG always decreases the sum MG. In contrast, in the second setup, for certain parameters, the highest sum MG is achieved at maximum delay-sensitive MG and thus increasing the delay-sensitive MG provides a gain in sum MG.Additionally, we also study a cloud radio access network with mixed delay constraints, i.e., where each mobile user can simultaneously send a delay-sensitive and a delay-tolerant stream and only the delay-tolerant data is jointly decoded at the cloud unit. For this network, we derive inner and outer bounds on the capacity region under mixed delay constraints, and we exactly characterize the optimal MG region. At high signal-to-noise ratio (SNR), our results show that for moderate fronthaul capacities, the maximum MG for delay-sensitive messages remains unchanged over a large regime of small and moderate MGs of delay-sensitive messages. The sum MG is thus improved if some of the messages can directly be decoded at the base stations. At moderate SNR, the results show that when the data rate of delay-sensitive messages is small or moderate, the achievable sum rate is constant
Terrasson, Guillaume. "Contribution à la conception d'émetteur-récepteur pour microcapteurs autonomes." Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13682/document.
Повний текст джерелаSurvey on wireless microsensor networks highlights the main constraint of energy autonomy. In fact, these autonomous and communicating microcomponents named network nodes are scattered into few or not open environment. The goal of our work is to propose a transceiver design method adapted to microsensor networks. After a demonstration of predominant part of RF into the mean power consumption of a microsensor node, we developed three new simulation tools which correspond to different level of transceiver modelling. Their use and obtained simulation results demonstrate the relation between transceiver specifications and performances with power consumption. The association of these tools was used to propose a new design method under power consumption constraint. Finally, we designed, produced and tested a 868 MHz Low Noise Amplifier which presents interesting power consumption characteristics
Irava, Venkata Srinivas. "Low-cost delay-constrained multicast routing heuristics and their evaluation." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Summer2006/v%5Firava%5F072106.pdf.
Повний текст джерела