Дисертації з теми "Réseau DTN"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-49 дисертацій для дослідження на тему "Réseau DTN".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Pham, Tuan-Minh. "Modélisation et Analyse de la Distribution de Contenus dans un Réseau DTN." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2011. http://tel.archives-ouvertes.fr/tel-00625620.
Повний текст джерелаPham, Tuan Minh. "Modélisation et analyse de la distribution de contenus dans un réseau DTN." Paris 6, 2011. http://www.theses.fr/2011PA066554.
Повний текст джерелаBaudic, Gwilherm. "HINT - from opportunistic network characterization to application development." Phd thesis, Toulouse, INPT, 2016. http://oatao.univ-toulouse.fr/17354/1/Baudic_Gwilherm.pdf.
Повний текст джерелаHaillot, Julien Christophe Nicolas. "Définition et validation d'un modèle de communication supportant la communication basée contenus dans les réseaux mobiles ad hoc discontinus." Lorient, 2010. https://tel.archives-ouvertes.fr/tel-00599669.
Повний текст джерелаResearch activity in the area of mobile ad hoc networks (MANETs) has aimed mainly at defining dynamic routing methods within these networks. Most proposals assume that communication between two mobile devices is possible only if a message delivery route can be established between devices when necessary. This approach is equivalent to considering that communication between two mobile devices can only be achieved in a fully-connected network. More recently, the field has been extended to consider the specificities of disconnected MANETs, that is MANETs appearing as collections of subnets (referred to as islands of connectivity) within which terminals can communicate using dynamic routing, but among which no communication is possible. Routing in such networks is a research area that is gaining attention. The approach generally adopted, called opportunistic networking, is to leverage mobile devices as data mules, able to store, carry, and forward messages among disconnected islands in order to deliver messages to their destinations. In this thesis I am interested in supporting content-based communication in disconnected MANETs. Content-based communication is a communication model in which information flows towards interested terminals rather than towards specifically set destinations. I believe that many applications can benefit from this communication model, such as file sharing, news articles distribution, service advertisement and discovery, etc. In this manuscript I present the communication protocol I have designed to provide this style of communication in disconnected MANETs ; I also present the experiments I conducted to validate my approach. This protocol relies on a combination of content-based communication, opportunistic networking, and multi-hop communication concepts to take into account the characteristics of disconnected mobile ad hoc networks
Matzakos, Panagiotis. "Techniques d'ordonnancement et gestion de la congestion pour la provision de QoS aux réseaux DTN." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0060.
Повний текст джерелаDisruption Tolerant Networks (DTNs) generally refer to a wide range of mobile networking environments which suffer from intermittent connectivity, due to reasons such as nodes mobility, poor wireless link conditions etc. In this context, the store-carry-and forward approach allows to store data locally at the nodes, to survive communication disruptions. However, ensuring end-to-end reliable data delivery (as with TCP) is very challenging, especially for environments where the mobile nodes come in communication range randomly (opportunistic contacts). Many existing approaches provide distributed resources management techniques with the aim of maximizing the performance of the network in such resource limited environments. However, such approaches generally consider application sessions of equal importance. The aim of this thesis was to propose efficient ways to add the dimension of multi-QoS class support in the resources management framework. We provide a distributed constrained optimization framework based on delivery predictions, which aims to guarantee the optimal balance between: (i) individual QoS classes satisfaction and (ii) overall performance maximization. To this end, our approach can be considered as a “loose” equivalent of reliable delivery, mapped to opportunistic DTNs. We then provide different alternatives for extending our policies, in order to account for real life mobility conditions which affect the accuracy of delivery predictions. Through extensive evaluation based on synthetic and real mobility traces we validate the optimality of our approach as well as the fact that it outperforms other existing QoS prioritization policies
Coriat, Florent. "Géolocalisation et communication en situation de crise." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS340.
Повний текст джерелаIn the aftermath of a natural or industrial disaster, locating individuals is crucial for first responders. However, disasters can cause extensive damage to the network infrastructures and a generalized loss of communication among survivors. In this thesis, we present a network support solution that provides a post-disaster geolocation-collecting service that relies on inter mobile device connections. On top of this dynamically built network, survivors' mobile device that get into contact exchange information about geolocation of others they have encountered and risk areas they have seen. Such information is routed towards pre-defined data collection centers, endowed with resilient processing and storage equipment, where first-responders can exploit it. Whe also present our mobility model, specific to crisis situations, that we used to conduct experiments on the ONE simulator. We evaluate the effect of different parameters of mobility and communication on our system performances. We especially analyse the impact of the proportion of motionless people. The feasability of our architecture has also been validated through the building of a physical test platform, based on pico-computers (Raspberry Pi). We finally contributed to define a new local centrality metric for time varying graphs, which could be used to infer useful information for routing
Herberg, Ulrich. "Réseaux Ad Hoc : Performance, Dimensionnement, Gestion Automatisée et Intégration dans l'Internet." Phd thesis, Ecole Polytechnique X, 2011. http://pastel.archives-ouvertes.fr/pastel-00598156.
Повний текст джерелаBenferhat, Djamel. "Conception d'un système de communication tolérant la connectivité intermittente pour capteurs mobiles biométriques - Application à la supervision médicale de l'activité cardiaque de marathoniens." Phd thesis, Université de Bretagne Sud, 2013. http://tel.archives-ouvertes.fr/tel-00904627.
Повний текст джерелаRamiro-Cid, Victor. "Caractérisation et applications de marches aléatoires temporelles dans les réseaux opportunistes." Thesis, Toulouse, ISAE, 2015. http://www.theses.fr/2015ESAE0023/document.
Повний текст джерелаThe Internet has entirely reshaped the way we communicate and interact with one another. The rapid development of the wireless infrastructure by network providers has being accompanied by an exponential growth in the number of mobile users. However, global Internet access and connectivity still face several challenges: scarce or poor quality connectivity in developing countries or places with limited accessibility, physical obstacles limiting the deployment of wireless networks and natural or man-made disasters. Delay tolerant networks (DTNs) were introduced to deal with environments where interruptions or disruptions of service were expected. Such networks usually lack of end-to-end paths or any infrastructure to help communications. In these networks, mobile nodes may interact using their contacts as a communication opportunity. The store-carry-forward paradigm allows nodes to exploit spatio-temporal paths created by contact opportunities in order to deliver messages over time. Instead we raise the question: can we design a mobile and opportunistic infrastructure that could help deliver messages? In the quest to provide such infrastructure, we study the application of temporal random walks (TRW) over the opportunistic networks. We explore the application and impact of TRW as a minimal and non invasive infrastructure from two points of view: data forwarding and data recollection/transmission
Mezghani, Farouk. "La dissémination de contenus dans les réseaux véhiculaires." Phd thesis, Toulouse, INPT, 2015. http://oatao.univ-toulouse.fr/14471/1/Mezghani_Farouk_INPT.pdf.
Повний текст джерелаDiana, Rémi. "Le routage dans les réseaux DTN : du cas pratique des réseaux satellitaires quasi-déterministes à la modélisation théorique." Thesis, Toulouse, ISAE, 2012. http://www.theses.fr/2012ESAE0036/document.
Повний текст джерелаSatellite communication is the achievement of more than 50 years of research in the fields of telecommunications and space technologies.First satellites had exorbitant costs for very limited performances. Technological advances occurred in these areas have helped them to become commercially feasible and satisfying. This enable the increase of satellite launches and thus, building complete satellite networks.Today, there are many GEO or LEO satellite constellations used for civilian or military applications. In general, routing in these constellations is done by pre-computing existing routes. These routes are then used for a given period and refreshed if needed. This type of routing is optimal only on deterministic topologies as a consequence we need to consider other solutions if we relax this assumption. The objective of this thesis is to explore alternatives to pre-computed routing. As a potential solution, we propose to assess the suitability of replication based routing protocols issued from the world of delay tolerant networks, DTN. To provide a relevant framework to study this topic, we focus on a particular constellation that present a quasi-deterministic nature and do not provide direct connectivity between all nodes of the system. In a second part, we focus on the modeling of the Binary Spray and Wait, routing protocol. We develop a model that can theoretically determine the distribution of end-to-end delay for any type of network, homogeneous and heterogeneous. Finally, we present a possible use of this model to conduct more in-depth theoretical analysis
Leguay, Jérémie. "Hétérogénéités et Routages dans les Réseaux à Connectivité Intermittente." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2007. http://tel.archives-ouvertes.fr/tel-00809771.
Повний текст джерелаBorrel, Vincent. "Une approche intégrée pour la mobilité humaine dans les réseaux auto-organisables : causes et conséquences." Paris 6, 2008. http://www.theses.fr/2008PA066551.
Повний текст джерелаReynaud, Laurent. "Stratégies de mobilité optimisées pour la tolérance aux perturbations dans les réseaux sans fil." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE1060/document.
Повний текст джерелаThroughout this thesis, we seek to propose and design optimized strategies that are adapted to a widespread class of use cases in which communications between network nodes may be disrupted by adverse deployment conditions, assuming that standard fault repair mechanisms are unable to address and mitigate the effects created by these disruptions. Such use cases include the applicative context of emergency communication networks, which are often met in the wake of disasters, or more generally after the occurrence of any unexpected event which may leave the existing networks of an affected area partially or even totally damaged. The aforementioned disruptions can be of different nature: they may result from a detrimental network dimensioning (e.g. low number of network nodes, excessive node scattering surface, insufficient radio communication range, . . . with respect to the other considered deployment parameter values). They may also stem from external causes, e.g. the unexpected presence of obstacles on the area of interest, or the existence of extrinsic interference sources that may disturb the considered network. In general, it can be observed that given such disruptions, a network which is not inherently designed to operate in these conditions is likely to under-perform and, as a result, to offer a significantly decreased quality of experience to its users. In this regard, we seek to compare our perception of the traditional concept of mobility as seen in common infrastructure, ad hoc or disruption- and delay-tolerant wireless networks with the principles of controlled mobility, according to which a network node may directly control its own movement and affect its trajectory accordingly. More precisely, we investigate the means to define a virtual force system which encompasses multiple repulsive, attractive, friction and alignment forces, all of which may be applied to network nodes in order to enforce this principle of controlled mobility.We then explain how virtual forces can concretely be implemented and used in a realistic network deployment, and we specify a protocol solution and its variations, which we enforce within controlled mobility strategies with the prospect that those prove best suited to the considered network environments. We first take as an applicative background a scenario aiming to fight the spread of an invasive species, the Asian hornet, and we outline a practical deployment relying on a wireless ad hoc network formed with unmanned aerial nodes which all enforce our first proposed controlled mobility strategy. We then seek to identify the best value intervals for the key parameters of our virtual force-based protocol, anticipating that configured with these values, the deployed network will yield its best performance in terms of delays and packet delivery. Later, we introduce a scenario related to the deployment of an emergency communication network, still on the basis of wireless ad hoc network principles. We then present an analysis of how a second proposed controlled mobility strategy performs in this applicative environment. In particular, we show how this strategy behaves when the number of network nodes increases. At that point, we address the context of networks deployed in challenging conditions, and of the use of disruption- and delaytolerant mechanisms. We aim here at designing a third type of strategy that jointly uses disruption- and delay-tolerant mechanisms as well as controlled mobility principles, in order to significantly increase the overall network performance. We then investigate and explain how this strategy allows transmitting a fraction of the user traffic with short delays, when an end-to-end route is available along a communication chain, while the other fraction of the traffic is delivered with longer delays, with the support of delay-tolerant routing mechanisms
Said, Romeo. "Intergiciel pour la fourniture de services dans les réseaux mobiles ad hoc discontinus." Phd thesis, Université de Bretagne Sud, 2011. http://tel.archives-ouvertes.fr/tel-00596996.
Повний текст джерелаBorel, Simon. "L’axiomatique des réseaux : entre réalités sociales et impensés éthico-politiques." Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100157/document.
Повний текст джерелаAs a result mainly of the increasing weight of Internet, especially in the last decade, it has become more and more acknowledged that the world appears as a gigantic network. The network phenomenon becomes into view as the archetypal contemporary total social fact, theorized and surrounded by researchers, essayists, activists, prophets, each of them pursuing its own agenda. Some academics appreciate the network as the "world society" in gestation. Others, on the contrary, see the emergence of networks as a vector towards the disappearance of communal world, and also of progressive decivilization and desymbolization. Those who appear as the prophets and heralds of networks believe that the world’s salvation lays in the democratic, solidaristic and donatist virtues of the connected multitudes in their common struggle against the world privatization and merchandization.Despite their antagonisms, these approaches converge on the idea that a very large virtual global society, where remote social relationships and communication immediateness are the rule, is in the making. Nevertheless, the interpretations of this digital sociality are too diverse and contradictory to help us distinguishing the part of reality they encompass, and what actually derives from ideology, prophecy and/or catastrophism. In this respect, the networks' axiomatic is confronted to two fundamental lacks, which need to be further explored: the relationship between virtual sociality and face-to-face relations and institutional mediations on the one hand; and the exploration of virtuous or harmful digital relations characteristic, not intrinsically speaking, but in the relationships it maintains with contemporary neo-liberal and “parcellitarian” (propensity towards explosion, atomization and fragmentation of societies) shapes in the other hand. This thesis therefore questions the degree of reality of this new sociality, and the status of reticular individualism or, more specifically, the shape which the figure of the individual take between emancipation through networks as proclaimed by some observers (recognition of authenticity and self-realization), and the alienation to them as decried by others (tyrannies of visibility and permanent connectivity). The question of emancipation (subjective and collective) drives us to question the place of giving in the dynamics of the current virtual sociality between subsistence of the spirit of giving, revitalization or even radicalization, and, via its generalization in the current “parcellitairian” shape, demolition and “depotentialization”
Baouche, Mohamed Chakib. "Une solution tolérante aux délais pour des applications de localisation et de traçabilité a posteriori en milieux confinés." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2012. http://tel.archives-ouvertes.fr/tel-00857206.
Повний текст джерелаBelouanas, Salah-Eddine. "Dissémination de contenus populaires et tolérants au délai dans les réseaux cellulaires." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066230/document.
Повний текст джерелаCellular resources are valuable and must be saved whenever possible. In this thesis, we address the problem of content dissemination within an overloaded cellular network. Firstly, we propose SCoD (Scheduled Content Delivery), a purely cellular dissemination strategy that exploits the mobility of users and their delay tolerance in order to postpone transmissions. SCoD waits for users to gather around a minimum number of access points so that the total number of transmissions is reduced. To trigger transmissions, SCoD relies on different decision functions which launch, if necessary, a multicast transmission. The second part of this thesis deals with the same problem of saving cellular resources, but from another angle. We use D2D (Device-to-Device) communications with multicast to mitigate the traffic load on the infrastructure. We study the benefits of opportunistic communications in the context of a content distribution service based on user subscriptions. We present our results in two ways. First, we illustrate the benefits of D2D communications in a content dissemination process where the cost of opportunistic transmission is negligible compared to that of cellular transmission. Then, we consider the case where users must be compensated for their participation in the dissemination process. Therefore, there is a tradeoff to be found, we thus provide guidelines in this direction and show the variation of such a tradeoff as a function of several network parameters
Auzias, Maël. "Programming Support for a Delay-Tolerant Web of Things." Thesis, Lorient, 2017. http://www.theses.fr/2017LORIS462/document.
Повний текст джерелаThe Internet of Things (IoT) is usually presented as a set of THINGS interconnected through a network that is, in practice, Internet. However, there exist many contexts in which the connectivity is intermittent due to short-range wireless communication means or energy constraints. The Delay Tolerant Networking (DTN) architecture and the Bundle Protocol (BP) are known to overcome this communication challenge as they provide communication means by relying on a store-carry-and- forward mechanism. This thesis aims to provide programming supports adapted to both IoT and DTN contexts. For this, both DTN and IoT (DT-IoT) challenges are studied and several design principles are proposed. These principles aim to optimize reactivity and efficiency of applications targeting the DT-IoT context. The first contribution is the definition of a resource-oriented programming support, named BoaP, to enable a DT-IoT. It provides a protocol based on request/response thanks to a transposition of CoAP (Contrained Application Protocol). This transposition consists of fundamental adjustments and enhancements to use BP as the underlying transport protocol. BoaP has been implemented and tested in a small physical network. A method to evaluate middleware systems in DTNs is presented. A tool implementing this method has been developed. It relies on a virtualization platform that simulates network contacts and emulates network devices. This tool was used to run experimentations that assessed the validity of BoaP. Finally, another programming support is investigated. It follows a service-oriented approach and respects REST (Representational State Transfer) constraints. It is built on top of BoaP with IoT in mind and is adapted to DTN environments. Its discovery/advertisement exploits a publish/subscribe interface. Service descriptors contain specific fields to inform on the availability of the service providers. %Finally, requests are extended with some options to enforce conditions on geographic or time context
Talon, Laurent. "Simulation numérique d'écoulements confinés de fluides miscibles par la méthode BGK sur réseau." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2004. http://tel.archives-ouvertes.fr/tel-00007304.
Повний текст джерелаFarah, Joseph. "Enjeux et défis de la contribution des réseaux sociaux numériques à une transmission réussie : le cas de l’Eglise catholique." Thesis, Reims, 2014. http://www.theses.fr/2014REIMS040/document.
Повний текст джерелаAt first, the digital social networks (DSN) were understood as communicational means: example, search an old friend in order to create a communication. With this tentacular revolution of this horizontal communication, another vertical axe was born: the transmission. Politicians (Obama and Facebook during the electoral campaign at the USA), stars, leaders, Men of the Church (Benoit XVI first Pope at Twitter), etc. imposed a new sample of presence: a vertical transmission, a process where a signal, a message is moving towards from a transmitter to a receiver or to a mass. The transmission is often devoid of interactivity. It's the dilemma of the DSN: Transmission and communication. To communicate a message means to bring it on a horizontal axe (speaker/interlocutor). To transmit a message means to bring it on hierarchic vertical axe (transmitter/receiver).The transmitted message may fail: refusal of the message, wrong message, wrong transmitters, etc. As for the Catholic Church, our case study, the failure in the transmission of its message (the faith) may be destroying: heresy, sentimentalism, dangerous transmission, obsession even devilish, etc.How a Catholic Church, with its hierarchic structure, can set up a successful transmission: Official (sure), acceptable and instructive? How a Catholic Church can respect and assure the reconciliation between the two pillars of the DSN: Communication (horizontal axe) and transmission (vertical axe)?In the first part, we find an observation of the development of the social network that has taken on, as one goes along, the shape that we know nowadays, Digital Social Networks (DSN). In the second part, and after a historical summary of the major stages of the formulation of the medias church conception, and a presentation of the key masterly texts concerning its vision towards DSN, an interview with the administrator of the ecclesiastic group about the DSN (a sample) and a questionnaire addressed to the members will be achieved in order to reveal instructions and explanations that draw the vital lead of the last part of the thesis.A novelty is presented in the last part: a new strategy of transmission 2.0 that is constituted of different propositions:-Prior transformations in the bosom of the Church in its view of the DSN world: The DSN are an occasion created from the relationship of the two axes: vertical and horizontal.-To establish an official institution and ecclesiastical DSN offices in order to manage the certified groups.-A technical and office automation collaboration between: Church and DSN firms (Facebook, Twitter, Google + etc).-An outline of a wiki-manual: an official document that constitutes an “open source” it sets up the general instructions of the transmission 2.0 of the Church
Humeau, Julie. "Les Tibétains exilés en Inde : dynamique des réseaux d'entraide et transformation du don bouddhique tibétain." Aix-Marseille 1, 2010. http://www.theses.fr/2010AIX10034.
Повний текст джерелаMlaiki, Alya. "Compréhension de la continuité d'utilisation des réseaux sociaux numériques : Les apports de la théorie du don." Phd thesis, Université Paris Dauphine - Paris IX, 2012. http://tel.archives-ouvertes.fr/tel-00794930.
Повний текст джерелаDupont, Damien. "Cartographie in vivo des remaniements anatomo-fonctionnels de l’architecture des réseaux neuronaux dans le système nerveux central au cours du développement par Imagerie du Tenseur de Diffusion et Imagerie renforcée par le manganèse." Thesis, Paris 11, 2013. http://www.theses.fr/2013PA112021/document.
Повний текст джерелаThe thesis aim is to develop MRI methods to study the impact of focal transient ischemia in neonatal rat brain. The principal techniques used are MEMRI (Manganese Enhanced MRI), DTI (Diffusion Tensor Imaging) and QBI (Q-Ball Imaging). MEMRI was used to observe in a dynamic way the cortico-thalamic manganese transport combined with the structural informations extracted from the DTI experiments. Results have shown a cortico-thalamic pathway disturbance, at seven and fourteen days after ischemia. Globally DTI results have shown a slowed brain structuration. From these results, the feasibility of a fast acquisition method and the post processing steps of Q-ball protocol was established and applied in an immature rat. The different MRI protocols developed during this thesis have shown good efficiency to follow the rat brain maturation, in healthy and pathological conditions, thus opening new perspectives for brain development studies
Desfosses, Emilie. "Etude préclinique par imagerie métabolique du TDAH : caractérisation des mécanismes physiopathologiques et des réponses aux traitements pharmacologiques." Thesis, Tours, 2016. http://www.theses.fr/2016TOUR3310.
Повний текст джерелаAttention Deficit Hyperactivity Disorders (ADHD) is a neurodevelopment disorder affecting childs and adults presenting attention deficits, hyperactivity and impulsivity. Despite numerous neuroimaging studies on ADHD patients, the specific dysfunctions underlying the symptoms of ADHD remain unknown. To date, ADHD patients can be treated using psychostimulant drugs such as methylphenidate (MPH) and other promising compounds are currently in development (dymesilate-lisdexamfétamine (LDX) and guanfacine (GFC), that are psychostimulant and non psychostimulant medications, respectively). Even if the molecular targets of these medications are well defined, how these compounds will impact the brain activity to reverse ADHD symptoms is less known. The objectives of this work were to study (i) the pathophysiology of ADHD and (i) the effects of an acute or repeated administration of MPH, LDX or GFC using animal models and microPET imaging with 2-deoxy-2-(18F)fluoro-d-glucose (18FDG). First, we used an animal model of ADHD, namely the SHR/NCrl and WKY/NCrl rats that both exhibit attention deficits, with impulsivity-hyperactivity only displayed by SHR/NCrl rats. MicroPET imaging using 18FDG on awake rats was performed to obtain brain metabolic profiles of these animals. Our hypothesis was that SHR/NCrl and WKY/NCrl would shared brain dysfunctions in several regions of interest involved in the attention deficits, while SHR/NCrl rats would also displayed specific abnormalities related to hyperactivity-impulsivity. Our results confirmed these hypothesis as both SHR/NCrl and WKY/NCrl showed metabolic alterations in fronto-striatal limbic regions and in areas of the default mode network. In addition, SHR/NCrl specifically exhibited functional modifications in fronto-striatal associative areas.Second, daily injections with MPH, LDX or GFC were performed on control rats from adolescence to adulthood (corresponding to a treatment from childhood to the end of adolescence in humans). The effects of such treatments were evaluated after the first and the last injections on freely moving rats using microPET imaging with 18FDG. Our results showed that each medication affects the activity of limbic brain regions. In addition, LDX has an interesting profile showing effects also on associative fronto-striatal areas and on thedefault mode network. To our knowledge, these are the first preclinical neuroimaging results highlighting the crucial role of limbic brain regions related to motivation and the default mode network in the pathophysiology of attention deficits in ADHD. These data also reinforce the hypothesis that ADHD medications act on the brain areas primarily involved in the pathophysiology of ADHD. Interestingly, we showed that GFC and MPH shared the same effects on the limbic brain regions suggesting that this non psychostimulant medication is of a great interest for the treatment of ADHD. While MPH and GFC act primarily on limbic circuits, LDX also altered the activity of the default mode network and associative fronto-striatal areas. This support the hypothesis that LDX could be an interesting education for treating ADHD acting on all the systems identified as dysfunctional in the animal models of ADHD
Medjiah, Samir. "Optimisation des protocoles de routage dans les réseaux multi-sauts sans fil à contraintes." Thesis, Bordeaux 1, 2012. http://www.theses.fr/2012BOR14663/document.
Повний текст джерелаGreat research efforts have been carried out in the field of challenged multihop wireless networks (MWNs). Thanks to the evolution of the Micro-Electro-Mechanical Systems (MEMS) technology and nanotechnologies, multihop wireless networks have been the solution of choice for a plethora of problems. The main advantage of these networks is their low manufacturing cost that permits one-time application lifecycle. However, if nodes are low-costly to produce, they are also less capable in terms of radio range, bandwidth, processing power, memory, energy, etc. Thus, applications need to be carefully designed and especially the routing task because radio communication is the most energy-consuming functionality and energy is the main issue for challenged multihop wireless networks.The aim of this thesis is to analyse the different challenges that govern the design of challenged multihop wireless networks such as applications challenges in terms of quality of service (QoS), fault-tolerance, data delivery model, etc., but also networking challenges in terms of dynamic network topology, topology voids, etc. Our contributions in this thesis focus on the optimization of routing under different application requirements and network constraints. First, we propose an online multipath routing protocol for QoS-based applications using wireless multimedia sensor networks. The proposed protocol relies on the construction of multiple paths while transmitting data packets to their destination, i.e. without prior topology discovery and path establishment. This protocol achieves parallel transmissions and enhances the end-to-end transmission by maximizing path bandwidth and minimizing the delays, and thus meets the requirements of QoS-based applications. Second, we tackle the problem of routing in mobile delay-tolerant networks by studying the intermittent connectivity of nodes and deriving a contact model in order to forecast future nodes' contacts. Based upon this contact model, we propose a routing protocol that makes use of nodes' locations, nodes' trajectories, and inter-node contact prediction in order to perform forwarding decisions. The proposed routing protocol achieves low end-to-end delays while using efficiently constrained nodes' resources in terms of memory (packet queue occupancy) and processing power (forecasting algorithm). Finally, we present a topology control mechanism along a packet forwarding algorithm for event-driven applications using stationary wireless sensor networks. Topology control is achieved by using a distributed duty-cycle scheduling algorithm. Algorithm parameters can be tuned according to the desired node's awake neighbourhood size. The proposed topology control mechanism ensures trade-off between event-reporting delay and energy consumption
Schutz, Georges. "Adaptations et applications de modèles mixtes de réseaux de neurones à un processus industriel." Phd thesis, Université Henri Poincaré - Nancy I, 2006. http://tel.archives-ouvertes.fr/tel-00115770.
Повний текст джерелаartificiels pour améliorer le contrôle de processus industriels
complexes, caractérisés en particulier par leur aspect temporel.
Les motivations principales pour traiter des séries temporelles
sont la réduction du volume de données, l'indexation pour la
recherche de similarités, la localisation de séquences,
l'extraction de connaissances (data mining) ou encore la
prédiction.
Le processus industriel choisi est un four à arc
électrique pour la production d'acier liquide au Luxembourg. Notre
approche est un concept de contrôle prédictif et se base sur des
méthodes d'apprentissage non-supervisé dans le but d'une
extraction de connaissances.
Notre méthode de codage se base sur
des formes primitives qui composent les signaux. Ces formes,
composant un alphabet de codage, sont extraites par une méthode
non-supervisée, les cartes auto-organisatrices de Kohonen (SOM).
Une méthode de validation des alphabets de codage accompagne
l'approche.
Un sujet important abordé durant ces recherches est
la similarité de séries temporelles. La méthode proposée est
non-supervisée et intègre la capacité de traiter des séquences de
tailles variées.
Raiss, El Fenni Mohammed. "Opportunistic spectrum usage and optimal control in heterogeneous wireless networks." Phd thesis, Université d'Avignon, 2012. http://tel.archives-ouvertes.fr/tel-00907120.
Повний текст джерелаFeng, Xiaowen. "Efficient baseband digital predistortion techniques for linearizing power amplifier by taking into account nonlinear memory effect." Nantes, 2015. https://archive.bu.univ-nantes.fr/pollux/show/show?id=3619006c-f9da-4c0b-8b67-4445eda2c7b1.
Повний текст джерелаBaseband digital predistortion (DPD) techniques for linearizing power amplifiers (PA) with memory effects are investigated in this thesis. Firstly, the relevant elements concerning PA linearization are introduced, such as PA nonlinearity behavior, its influence on the communication systems, its modeling and characterization. . . Then some existing linearization techniques are presented, such as power backoff, feedforward, feedback, linear amplification with nonlinear components and DPD. DPD is the most promising linearization technique. After that, the implementation architecture and identification algorithms of DPD are described. In this thesis, four DPD methods are proposed. The first method (MP/LUT DPD) is to combine a memory polynomial (MP) model and a simple non-interpolated LUT. Both the amplitude and phase of the predistorted signal are calculated by LUT. The second method is to add linear interpolation technique to MP/LUT DPD. The third method improves the second one by using a quadratic interpolation technique to MP/LUT DPD. The fourth method is to combine MP DPD and feed forward neural network. The principal innovation is that the training samples of the neural networks are the predistorded signal obtained by MP DPD. Finally, simulation results and experimental results are given and analyzed. The proposed methods provide different trade-off between the linearization performance, time efficiency and complexity
Tournoux, Pierre Ugo. "Un protocole de fiabilité basé sur un code à effacement "on-the-fly"." Phd thesis, Université Paul Sabatier - Toulouse III, 2010. http://tel.archives-ouvertes.fr/tel-00547003.
Повний текст джерелаDupont, Damien. "Cartographie in vivo des remaniements anatomo-fonctionnels de l'architecture des réseaux neuronaux dans le système nerveux central au cours du développement par Imagerie du Tenseur de Diffusion et Imagerie renforcée par le manganèse." Phd thesis, Université Paris Sud - Paris XI, 2013. http://tel.archives-ouvertes.fr/tel-00817187.
Повний текст джерелаMertz, Théophile. "Optimisation simultanée de la configuration et du dimensionnement des réseaux de chaleur urbains." Thesis, Pau, 2016. http://www.theses.fr/2016PAUU3019/document.
Повний текст джерелаThe aim of this thesis is to develop a method that provides design assistance for District Heating Network (DHN). This tool allows simultaneously the optimization of the configuration and its sizing, thanks to an MINLP formulation (Mixed Integer Non-Linear Programming). Binary variables help to choose the optimal configuration (network layout and technologies of production), whereas continuous variables help DHN sizing (temperature, diameter, velocity, heat exchanger area, thermal generating capacity …). The objective function to minimize is the total cost (capex and opex), subjected to numerous nonlinear constraints (e.g. thermal losses, pressure drop, energy balance).This method enables to design temperature cascade between consumers, when consumer temperature requirements are different, and also looped network (only one pipe in one trench). It helps also the decision to connect (or not) consumers to the main network and also the location(s) and type(s) of the heating plant. Moreover, the arbitrage between heat losses and pressure drops is taken into account thanks to physical considerations (non-linear equations). Eventually, it is possible to design 4th generation DHN and prove their financial profitability over the long terms (30 years). First a multi-step resolution strategy is proposed to ensure finding global optimum of the complex MINLP problem. Then academic study cases are analyzed to underline the numerous assets of the formulation. Finally, the optimal design compared to an existing DHN ensures the consistency of the method and allows to build a study case at a wider scale, which can be solved thanks to the comprehensive strategy developed. The design assistance method is available for initial design as well as for extension of existing DHN
De, Izarra Léonard. "Apport des méthodes cinétiques à la simulation d'écoulements dans les milieux poreux." Phd thesis, Université d'Orléans, 2012. http://tel.archives-ouvertes.fr/tel-00675306.
Повний текст джерелаArab, Mohamed Raed. "Reconstruction stochastique 3D d'un matériau céramique poreux à partir d'images expérimentales et évaluation de sa conductivité thermique et de sa perméabilité." Phd thesis, Université de Limoges, 2010. http://tel.archives-ouvertes.fr/tel-00514461.
Повний текст джерелаBaillot, Elodie. "Réseaux de collectionneurs et enjeux de patrimonialisation en Europe au XIXe siècle : le baron Davillier, le comte de Valencia de Don Juan et Lady Schreiber." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H027.
Повний текст джерелаThis thesis studies the creative potential of the interaction between several collectors and is based on the desire to shed light on the collecting methods of Baron Charles Davillier (1823-1883), Lady Charlotte Schreiber (1812-1895) and Juan Crooke y Navarrot, Count of Valencia de Don Juan (1829-1904). Analysed from the point of view of their careers, the study of their collecting activities shows that they defined commercial, scholarly and patrimonial practices. Claiming for the collector the status of creator implies asserting the status of author, an ambition to which the three protagonists of this essay particularly aspire. Davillier, Schreiber and Valencia de Don Juan indeed make it possible to consider the close link between collectionism and expertise at the time of the institutionalisation of art history in Europe. The relational method, which was favoured through the study of networks of influence, restores their leading roles in the history of European collecting in the second half of the 19th century. It is also effective in accounting for a number of phenomena shaped by their collecting practices, such as the birth of a context of emulation and a market for Spanish decorative arts, their historiography and their patrimonialisation. The gathering of their interests in Spain at the beginning of the 1870s allows us to better understand the implementation of a process of aestheticization
Bertrand, Perrine. "Étude en IRM des modifications des connectivités cérébrales anatomique et fonctionnelle en fonction de l'âge chez le sujet sain." Toulouse 3, 2012. http://thesesups.ups-tlse.fr/2021/.
Повний текст джерелаOur study was focused on the changes of anatomical and functional brain connectivity during aging. We acquired for each participant (47 male subjects, healthy, aged from 20 to 65) several MRI imaging (Philips 3T MRI): an anatomical sequence (T1 weighted image), a sequence of diffusion imaging in 32 directions and three sequences of functional imaging (at rest, during a motor task and an attentional). The anatomical image allows us to assess the brain atrophy and calculate the cortical thickness. With the diffusion tensor imaging (DTI) we have extracted fractional anisotropy and mean diffusivity and we have realized tractography. We used different software as SPM8 (Statistical Parametric Mapping), MATLAB (The MathWorks, Inc. ) and Statistica (Statsoft). We have analyzed the functional connectivity with the 3 sequences of fMRI using methods of Independent Component Analysis, and methods based on statistical analysis of networks (Network Based Statistics). Functional imaging has showed the role played by the Angular Gyrus (including many modifications on connections), and changes occurring in the Default-Mode Network and the Working Memory (decreases in the frontal lobe). Furthermore, we have demonstrated a decrease in fiber orientation in the anterior part of the Corpus Callosum, and in the cerebellum. Due to the study of anatomical connectivity, we have defined a set of sub-networks that resist structurally with age. Our contribution will allow a better characterization of the effect of normal aging on brain connectivity. Besides, benefits of this study may be useful for the comprehension of neurodegenerative diseases such as Alzheimer and Parkinson
Pannier, Emmanuel. "“Có đi có lại mới toại lòng nhau" Circulation non marchande et relations sociales dans un village du delta du fleuve Rouge (Nord du Vietnam) : donner, recevoir et rendre pour s'allier". Thesis, Aix-Marseille, 2012. http://www.theses.fr/2012AIXM3042/document.
Повний текст джерелаThe following ethnological research aims at grasping a few characteristic features of the Vietnamese principles of sociality, through the study of non-commercial transactions taking place in a village located in the Northern Vietnam. The first part of the doctoral thesis lists the forms, the practices and the nature of non-commercial transactions occurring in the village. The second part analyses the social meanings and functions of those symbolics transactions. The ethnographic description of the system shows that most of the transactions occurring are ritualized : on defined occasions, villagers give a gift to someone else in need and at the moment when they need it. Those non-commercial transactions can be defined as a system of ceremonial gif-giving based on mutual aid, gesture reciprocity, and moral debt. The study of the connections between the gifts given and the social relations involved in the transactions allow us to map out the organization of the social relations according to the degrees of closeness. This study ends with the analysis of the social function entailed by mutual gifts. Their role is mainly to create and strengthen tình cảm, relationships, that is to say relationships filled with spontaneous and moral feelings. Because those « bonding gifts » participate to the regulation of the personnel relationship in the village, we can consider that they embody that «fleeting moment when society sets » (Mauss, 1999: 275) in rural area in Northern Vietnam
Ali, Arshad. "Topics in Delay Tolerant Networks (DTNs) : reliable transports, estimation and tracking." Thesis, Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0038/document.
Повний текст джерелаMobile Ad hoc NETworks (MANETs) aim at making communication between mobile nodes feasible without any infrastructure support. Sparse MANETs fall into the class of Delay Tolerant Networks which are intermittently connected networks and where there is no contemporaneous end-to-end path at any given time. We first, propose a new reliable transport scheme for DTNs based on the use of ACKnowledgments and random linear coding. We model the evolution of the network under our scheme using a fluid-limit approach. We optimize our scheme to obtain mean file transfer times on certain optimal parameters obtained through differential evolution approach. Secondly, we propose and study a novel and enhanced ACK to improve reliable transport for DTNs covering both unicast and multicast flows. We make use of random linear coding at relays so that packets can reach the destination faster. We obtain reliability based on the use of so-called Global Selective ACKnowledgment. We obtain significant improvement through G-SACKs and coding at relays. Finally, we tackle the problem of estimating file-spread in DTNs with direct delivery and epidemic routing. We estimate and track the degree of spread of a message in the network. We provide analytical basis to our estimation framework alongwith insights validated with simulations. We observe that the deterministic fluid model can indeed be a good predictor with a large of nodes. Moreover, we use Kalman filter and Minimum- Mean-Squared-Error (MMSE) to track the spreading process and find that Kalman filter provides more accurate results as compared to MMSE
Jarry-Omarova, Anna. "Genre du pouvoir et démocratie libérale en Mongolie : analyse de l'échec du mouvement associatif des femmes, entre espace politique, nomadisme et ONG internationales." Phd thesis, Ecole des Hautes Etudes en Sciences Sociales (EHESS), 2010. http://tel.archives-ouvertes.fr/tel-00545781.
Повний текст джерелаLarat, Adam. "Conception et Analyse de Schémas Distribuant le Résidu d'Ordre Très Élevé. Application à la Mécanique des Fluides." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2009. http://tel.archives-ouvertes.fr/tel-00502429.
Повний текст джерелаNaso, Aurore. "Intermittence en Turbulence pleinement développée et en Dynamique non linéaire." Phd thesis, Université de Nice Sophia-Antipolis, 2005. http://tel.archives-ouvertes.fr/tel-00011134.
Повний текст джерелаLa seconde partie est consacrée à l'étude de la transition au chaos spatio-temporel par intermittence dans un système hydrodynamique réel. Cette transition est d'abord étudiée quantitativement, puis un modèle d'intermittence spatio-temporelle est appliqué aux conditions aux limites de l'expérience. Comme le système réel, les solutions de ce modèle présentent pour certaines valeurs des paramètres dont il dépend un régime de bistabilité, près du seuil, entre l'intermittence spatio-temporelle et un régime où le désordre n'est présent que sur les bords.
Payet, Linda. "Viscoélasticité et structure de gels à base de chitosane - Relations avec les propriétés diffusionnelles de macromolécules dans ces biogels." Phd thesis, Université Paris-Diderot - Paris VII, 2005. http://tel.archives-ouvertes.fr/tel-00011265.
Повний текст джерелаKyriakodis, Georgios-Evrystheas. "Development of a coupled simulation tool for urban building energy demand, district energy systems and microclimate modeling." Thesis, La Rochelle, 2020. http://www.theses.fr/2020LAROS028.
Повний текст джерелаThis PhD work investigates the complex links between urban physical processes, through the development of coupled simulation platforms to account simultaneously for building energy demand, individual or district energy systems, and urban microclimate. The spatial and temporal scales correspond to urban neighborhoods under explicit geometries, and annual simulations respectively. Several coupling strategies have been evaluated, regarding thermal efficiency indicators, and the determination of the diversity of coupled phenomena. The synchronous coupling schemes can effectively assess the dynamical interactions between buildings and the local microclimate. Nevertheless, the coupling variable is sensitive to the thermal properties of the building. The simplification of the urban canopy layer to a single-node description reveals significant variability in building energy demand. Besides, the developed model has been employed to assess the thermal performance of an urban neighborhood in La Rochelle. The transition from local energy systems to the district energy network eliminates anthropogenic heat from buildings, and improves the outdoor thermal comfort conditions, acting as a local heat island mitigation strategy. However, it is associated with an energy penalty due to the ground losses of the piping circuit. This energy penalty is amplified when a passive mitigation strategy (cool materials) is implemented concurrently
Tomashenko, Natalia. "Speaker adaptation of deep neural network acoustic models using Gaussian mixture model framework in automatic speech recognition systems." Thesis, Le Mans, 2017. http://www.theses.fr/2017LEMA1040/document.
Повний текст джерелаDifferences between training and testing conditions may significantly degrade recognition accuracy in automatic speech recognition (ASR) systems. Adaptation is an efficient way to reduce the mismatch between models and data from a particular speaker or channel. There are two dominant types of acoustic models (AMs) used in ASR: Gaussian mixture models (GMMs) and deep neural networks (DNNs). The GMM hidden Markov model (GMM-HMM) approach has been one of the most common technique in ASR systems for many decades. Speaker adaptation is very effective for these AMs and various adaptation techniques have been developed for them. On the other hand, DNN-HMM AMs have recently achieved big advances and outperformed GMM-HMM models for various ASR tasks. However, speaker adaptation is still very challenging for these AMs. Many adaptation algorithms that work well for GMMs systems cannot be easily applied to DNNs because of the different nature of these models. The main purpose of this thesis is to develop a method for efficient transfer of adaptation algorithms from the GMM framework to DNN models. A novel approach for speaker adaptation of DNN AMs is proposed and investigated. The idea of this approach is based on using so-called GMM-derived features as input to a DNN. The proposed technique provides a general framework for transferring adaptation algorithms, developed for GMMs, to DNN adaptation. It is explored for various state-of-the-art ASR systems and is shown to be effective in comparison with other speaker adaptation techniques and complementary to them
Martins, Carlos de Almeida. "Contrôle direct du couple d'une machine asynchrone alimentée par convertisseur multiniveaux à fréquence imposée." Tese, Toulouse, INPT, 2000. http://hdl.handle.net/10216/11690.
Повний текст джерелаMartins, Carlos de Almeida. "Contrôle direct du couple d'une machine asynchrone alimentée par convertisseur multiniveaux à fréquence imposée." Doctoral thesis, Toulouse, INPT, 2000. http://hdl.handle.net/10216/11690.
Повний текст джерелаSadli, Rahmad. "Étude et développement d'un dispositif routier d'anticollision basé sur un radar ultra large bande pour la détection et l'identification notamment des usagers vulnérables." Thesis, Valenciennes, 2019. http://www.theses.fr/2019VALE0005.
Повний текст джерелаIn this thesis work, we focused on the study and development of a system identification using UWB-Ultra-Wide-Band short range radar to detect the objects and particularly the vulnerable road users (VRUs) that have low RCS-Radar Cross Section- such as cyclist and pedestrian. This work is composed of two stages i.e. detection and recognition. In the first approach of detection stage, we have proposed and studied a robust UWB radar detector that works on one dimension 1-D radar data ( A-scan). It relies on a combination of Higher Order Statistics (HOS) and the well-known CA-CFAR (Cell-Averaging Constant False Alarm Rate) detector. This combination is performed by firstly applying the HOS to the received radar signal in order to suppress the noise. After eliminating the noise of the received radar signal, we apply the CA-CFAR detector. By doing this combination, we finally have an UWB radar detector which is robust against the noise and works with the adaptive threshold. In order to enhance the detection performance, we have evaluated the approach of using two dimensions 2-D (B-Scan) radar data. In this 2-D radar approach, we proposed a new method of noise suppression, which works on this B-Scan data. The proposed method is a combination of WSD (Wavelet Shrinkage Denoising) and HOS. To evaluate the performance of this method, we performed a comparative study with the other noise removal methods in literature including Principal Component Analysis (PCA), Singular Value Decomposition (SVD), WSD and HOS. The Signal-to-Noise Ratio (SNR) of the final result has been computed to compare the effectiveness of individual noise removal techniques. It is observed that a combination of WSD and HOS has better capability to remove the noise compared to that of the other applied techniques in the literature; especially it is found that it allows to distinguish efficiency the pedestrian and cyclist over the noise and clutters whereas other techniques are not showing significant result. In the recognition phase, we have exploited the data from the two approaches 1-D and 2-D, obtained from the detection method. In the first 1-D approach, Support Vector Machines (SVM) and Deep Belief Networks (DBN) have been used and evaluated to identify the target based on the radar signature. The results show that the SVM gives good performances for the proposed system where the total recognition accuracy rate could achieve up to 96,24%. In the second approach of this 1-D radar data, the performance of several DBN architectures compose of different layers have been evaluated and compared. We realised that the DBN architecture with four hidden layers performs better than those of with two or three hidden layers. The results show also that this architecture achieves up to 97.80% of accuracy. This result also proves that the performance of DBN is better than that of SVM (96.24%) in the case of UWB radar target recognition system using 1-D radar signature. In the 2-D approach, the Convolutional Neural Network (CNN) has been exploited and evaluated. In this work, we have proposed and investigated three CNN architectures. The first architecture is the modified of Alexnet model, the second is an architecture with three convolutional layers and one fully connected layer, and the third is an architecture with five convolutional layers and two fully connected layers. The performance of these proposed architectures have been evaluated and compared. We found that the third architecture has a good performance where it achieves up to 99.59% of accuracy. Finally, we compared the performances obtained using CNN, DBN and SVM. The results show that CNN gives a better result in terms of accuracy compared to that of DBN and SVM. It allows to classify correctly the UWB radar targets like cyclist and pedestrian
Mazé, Christelle. "Les marqueurs sociaux : représentation, identité, statut en Égypte ancienne : (IIIe millénaire – mi IIe millénaire avant notre ère)." Thesis, Lyon 2, 2010. http://www.theses.fr/2010LYO20102.
Повний текст джерелаThis research highlights how Ancient Egyptians displayed their social position, on the one hand according to the hierarchical relationships between individuals, and on the other hand according to their membership of different groups. Social markers are of both material as well as cultural kinds and can take concrete forms like objects of luxury and prestige, but also as subjective forms, like ways of expressing oneself and behaving through references to a culture developed by the elite. It is not a matter of presenting a complete catalogue here. The intellectual process consists of making understand how individuals, ddepending on their membership of different social classes, used and interpreted marks of identity, power and prestige, which had been created and sustained by the royalty and the elite at their service. Depending on the social importance of individuals, the considered time period, and the ability of the central government to assert itself as a source of legitimacy, personal and collective behaviours were not always the same, and values embodied in objects and manners have changed, as society has evolved. The material and symbolic significance of social markers could have been thrown into question during leadership crisis or on the contrary, it could have been developed by the adoption of references to new sources of power, such as ancestors and local governors during the First Intermediate Period. In this way, cultural imitation allows us to observe how persons who are not linked to the institutional spheres of the State manage to take up the official discourse imposed by the central government after all. This study is divided into three parts: the significance of lineage to assert a social position; the way ones behaves and occupies the space around, in topography or in ceremonial events; the use of objects as signs of social membership et means to express status and identity through material culture
Ameli, Mostafa. "Heuristic Methods for Calculating Dynamic Traffic Assignment Simulation-based dynamic traffic assignment: meta-heuristic solution methods with parallel computing Non-unicity of day-to-day multimodal user equilibrium: the network design history effect Improving traffic network performance with road banning strategy: a simulation approach comparing user equilibrium and system optimum." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSET009.
Повний текст джерелаTransport systems are dynamically characterized not only by nonlinear interactions between the different components but also by feedback loops between the state of the network and the decisions of users. In particular, network congestion affects both the distribution of local demand by modifying route choices and overall multimodal demand. Depending on the conditions of the network, they may decide to change for example their transportation mode. Several equilibria can be defined for transportation systems. The user equilibrium corresponds to the situation where each user is allowed to behave selfishly and to minimize his own travel costs. The system optimum corresponds to a situation where the total transport cost of all the users is minimum. In this context, the study aims to calculate route flow patterns in a network considering different equilibrium conditions and study the network equilibrium in a dynamic setting. The study focuses on traffic models capable of representing large-scale urban traffic dynamics. Three main issues are addressed. First, fast heuristic and meta-heuristic methods are developed to determine equilibria with different types of traffic patterns. Secondly, the existence and uniqueness of user equilibria is studied. When there is no uniqueness, the relationship between multiple equilibria is examined. Moreover, the impact of network history is analyzed. Thirdly, a new approach is developed to analyze the network equilibrium as a function of the level of demand. This approach compares user and system optimums and aims to design control strategies in order to move the user equilibrium situation towards the system optimum