Dissertations / Theses on the topic 'Modèle de routage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Modèle de routage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Garmendia, Torres Javier. "MobiRouting : Un modèle de routage des communications pour processus mobiles." Aix-Marseille 2, 2003. http://www.theses.fr/2003AIX22060.
Full textCoadou, Anthony. "Réseaux de processus flots de données avec routage pour la modélisation de systèmes embarqués." Phd thesis, Université de Nice Sophia-Antipolis, 2010. http://tel.archives-ouvertes.fr/tel-00545008.
Full textXue, Xiaoyun. "Mécanismes de Sécurité pour des Protocoles de Routage des Réseaux ad hoc." Phd thesis, Paris, ENST, 2006. http://www.theses.fr/2006ENST0045.
Full textMobile Ad hoc Networks (MANETs) refer to mobile and wireless networks independent of any infrastructure. Some ad hoc scenarios are in a hostile environment. Moreover, due to numerous constraints such as the lack of infrastructure, the lack of a-priori trust relationship, resource-constrained nodes, mobility, etc. , the ad hoc routing is vulnerable to numerous attacks. In this dissertation, we first present a classification of ad hoc routing vulnerabilities using the attack tree analysis model. The main characteristic of this work is that we distinguish objectives and mechanisms of attacks. This distinction can help security defenders to easily notice which attacks should be prevented under which security objectives. We then focus on the propositions of new secure mechanisms for ad hoc routing protocols, and we also pay attention to limit the performance degradation caused by security mechanisms. First of all, we proposed a Secure Watchdog for Ad hoc Networks (SWAN) to ensure the authentication in supervision and to reduce the storage requirement of watchdog. Secondly, a Trust-based Routing Protocol (TRP) is proposed, which is a protocol based on source routing and a trust model. Thirdly, two security mechanisms for Optimized Link State Routing protocol (OLSR), respectively Hash Proved Link State (HPLS) and TC Securing (TCSec), are proposed to reinforce the security and to reduce the cryptography overhead required by an existing solution. Simulations show that our mechanisms are both robust and lightweight. The dissertation is ended with some guidelines for the design of a new ad hoc routing protocol secured from scratch
Tellez, Portas Jorge Luis. "Spécification et implémentation d'un modèle d'information pour la gestion des réseaux WDM." Paris, ENST, 2001. http://www.theses.fr/2001ENST0041.
Full textBurlacu, Maria-Mihaela. "Analyse des performances et routage dans les constellations de nano-satellites : modèles et applications pour les régions éloignées." Phd thesis, Université de Haute Alsace - Mulhouse, 2010. http://tel.archives-ouvertes.fr/tel-00608660.
Full textMartins, Alexandre Xavier. "Métaheuristiques et modélisation du problème de routage et affectation de longueurs d'ondes pour les réseaux de communications optiques." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2011. http://tel.archives-ouvertes.fr/tel-00864176.
Full textDecharme, Bertrand. "Développement et validation d'une modélisation hydrologique globale incluant les effets sous maille et la représentation des zones inondées." Phd thesis, Université Paul Sabatier - Toulouse III, 2005. http://tel.archives-ouvertes.fr/tel-00518491.
Full textRivoirard, Lucas. "Modèle d'auto-organisation pour les protocoles de routage dans les réseaux ad hoc de véhicules : application à la perception élargie et à la localisation coopératives." Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1I041/document.
Full textAutomated driving can reduce accidents and improve the traffic flow by using communications between vehicles and dedicated infrastructures. Maintaining services when an infrastructure failed requires a routing protocol adapted to vehicle-to-vehicle (V2V) communications. This dissertation assumes the absence of dedicated infrastructure and global location service, each vehicle knowing its only own position. A V2V communication organization model, CBL, is proposed to create and maintain a structure that supports close exchanges between neighbouring vehicles and remote exchanges through the traffic. CBL creates a hierarchy where disjoint groups of neighbouring vehicles (leaves) are connected via a leader vehicle (branch) to a backbone (chain) formed along the road by the interconnection of the branches. CBL requires only the knowledge of the one-hop neighborhood and can be integrated into any routing protocol. The evaluations on road scenarios using IEEE-based traffic recommended on road environments in terms of size and message frequency show that CBL makes a better use of the spatial constraints due to the road. A structure is obtained that suits better in the optimisation of the broadcast traffic than the technique of multipoint relays in OLSR, but also compared to DSR, AODV and GRP protocols. Evaluations of cooperative application traffic such as ego-localization and extended perception show that CBL offers a communication service with low latency, low packet loss, according to a wanted trade-off between message frequency and performance
Maxa, Jean-Aimé. "Architecture de communication sécurisée d'une flotte de drones." Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30102/document.
Full textAdvances in miniaturization of embedded systems have helped to produce small Unmanned Aerial Vehicles (UAVs) with highly effective capacity. In order to improve their capability in civilian complex missions (for instance, to bypass an obstruction), it is now possible to deploy UAV swarms, in which cooperative UAVs share different tasks. This type of operations needs a high level of coordination between UAVs and Ground Control Station (GCS) through a frequent exchange of information. The communication capabilities are therefore an important objective to achieve for effective UAV swarm operations. Several communication architectures can be used to allow communication between UAVs and GCS. Ad hoc network is one of them and is an effective and promising solution for multi-UAV systems. Such a network is called UAANET (UAV Ad hoc Network) and is an autonomous system made of a UAV swarm and one or several GCS (Ground Control Station). This network can also be considered as a sub category of the well-known MANET (Mobile Ad hoc network). However, it has some specific features (such as node velocity, specific mobility model) that can impact performance of routing protocols. Furthermore, the nature of the wireless medium, along with the lack of fixed infrastructure, which is necessary to verify node and message authentication, create security breaches. Specifically, given the critical characteristic of the real-time data traffic, message authentication proves to be an important step to guarantee the security of the final UAS (composed of UAV swarm). Security of routing protocols has been widely investigated in wired networks and MANETs, but as far as we are aware, there is no previous research dealing with the security features of UAANET routing protocols. Those existing solutions can be adapted to meet UAANET requirements. With that in mind, in this thesis, we propose a secure and reliable communication architecture for a UAV swarm. In this work, the creation of UAANET has first been concieved. In order to do this, we studied the impact of existing MANET routing protocols into UAANET to assess their performance and to select the best performer as the core of our proposed secure routing protocol. Accordingly, we evaluated those existing routing protocols based on a realistic mobility model and realistic UAANET environment. Based on this first study, we created a secure routing protocol for UAANET called SUAP (Secure UAV Ad hoc routing Protocol). On the one hand, SUAP ensures routing services by finding routing paths between nodes to exchange real time traffic (remote monitoring video traffic). On the other hand, SUAP ensures message authentication and provides detection to avoid wormhole attack. The SUAP routing protocol is a reactive routing protocol using public key cryptography and hash chains. In order to detect wormhole attack, a geographical leash-based algorithm is used to estimate the correlation between the packet traveled distance and the hop count value. We also contribute to the certification of the secure communication system software through a Model-Driven Development (MDD) approach. This certification is needed to validate the operation of the UAV swarm, especially in cases where it is used to exchange control and command traffic. We used Simulink and Stateflow tools and formal verification tools of Matlab Software to design SUAP routing protocol. The evaluation of the effectiveness of SUAP has been executed both through emulation and real experiment studies. Our results show that SUAP ensures authentication and integrity security services and protects against a wormhole attack. It also provides an acceptable quality of service for real-time data exchanges
Harfouche, Leila. "Vers une intégration des comportements communautaires dans les réseaux mobiles." Phd thesis, Conservatoire national des arts et metiers - CNAM, 2011. http://tel.archives-ouvertes.fr/tel-00682193.
Full textNdiaye, Ismaïla Abderhamane. "Résolution de problèmes multicritères (durée/sécurité) pour la conception de plans d'évacuation de personnes." Thesis, Tours, 2016. http://www.theses.fr/2016TOUR4001/document.
Full textThe work presented in this thesis aims to propose methods for routing a mass population through a disturbed network whose data vary over time. This problem can be illustrated by disasters due to humans or natural events where people (potentially) affected have to leave their living places for a period of one to several days. In the literature, mass routing are often modeled as dynamic flow problems whose objective is to minimize the overall duration of the evacuation process from a set of gathering points towards another set of shelter locations. However few papers take into account the concept of safety during this routing nor deploying task forces that can secure or facilitate this process. In this context, the safety security can be seen as a danger affecting the quality of life of people we organize the trip. In this context, the safety can be seen as a danger that influence the health of the people we are trying to evacuate. Indeed, this hazardous event can be related to a radioactive cloud, a fire, a tsunami, an earthquake or a flooding which make some of paths becoming dangerous or less usable by evacuees
Mabiala, Moundele Dave Muriel. "Etudes des propriétés structurelles des réseaux ad hoc de véhicules." Paris 11, 2007. http://www.theses.fr/2007PA112350.
Full textOur area of research is survey and analysis of Vehicular Ad Hoc NETworks or VANETS. A VANET consists of vehicle capable exchanging information via a wireless network in an effort to improve road safety and provide Internet access for passengers, which is our area of interest. Compared to a classical ad hoc network, VANET is characterized by high mobility of nodes making the network topology strongly dynamic. To counter this problem, we are therefore interested in the traffic dynamics on road and problems that arise due to wireless communications. Our questions were: 1) What is the VANET network topology? 2) Is Internet access possible? 3) What is the influence of vehicle movement on routing? 4) What is the capacity and throughput available in such a wireless network? These provisions are concerned with the study of road traffic's using analytical tools and simulation. We demonstrate how the network is fragmented and characterize the probability of path existence and connection duration. The results show that the connection time is too short for example to access Web. The simulator models with microscopic road traffic has been developed to interface with NS-2, which was then used to compare two routing algorithms, DSR and GPSR, Contrary to earlier publications, our findings show that DSR is better than GPSR in all viewpoints. Finally, our simulations evaluate the available capacity. We conclude that a VANET which is purely Ad Hoc is not viable for non-safety applications and we need to use a hybrid network
Lee, Kyeongja. "Modèle global pour la Qualité de Service dans les réseaux de FAI : intégration de DiffServ et de l'ingénierie de trafic basée sur MPLS." Phd thesis, Ecole Centrale de Lille, 2006. http://tel.archives-ouvertes.fr/tel-00112088.
Full textDans ce travail, nous avons commencé par effectuer une étude comparative d'un point scalabilité et stabilité, de plusieurs algorithmes de routage multi-chemins, basés sur MPLS. Cela nous a permis de retenir WDP pour la sélection des chemins candidats et LDM pour la distribution des demandes de trafic reçues par un routeur entrant du réseau d'un FAI. Nous proposons dans ce travail PER, un algorithme qui est une amélioration de l'algorithme de distribution de LDM. Ces différents algorithmes nous ont permis de réaliser plusieurs algorithmes « hybrides » dont LBWDP (Load Balancing over Widest Disjoint Paths) qui par simulation a été prouvé comme étant un algorithme plus performant que des modèles comme LDM ou MATE.
Pour une meilleure garantie de QdS nous avons cherché à intégrer la différentiation de service (DiffServ) avec notre technique d'ingénierie de trafic (DiffServ-aware MPLS Traffic Engineering : DS-TE). Nous proposons PEMS (PEriodic Multi-Step algorithm for DS-TE network) comme un modèle de DS-TE pour différencier la qualité du service selon la classe du trafic. Dans ce cadre, nous proposons un nouvel algorithme de sélection de chemins candidats en fonctions des critères préférentiels de chaque classe de trafic. L'utilisation de PER permet ensuite de distribuer en fonction de critères dynamiques les demandes reçues sur les meilleurs chemins de chaque classe. Par simulation à l'aide de ns-2, nous avons montré que PEMS répartie moins bien la charge que LBWDP mais que les classes EF et AF ont une qualité de service meilleure que dans le cas de LBWDP.
Kyeongja, Lee. "Modèle global pour la Qualité de Service dans les réseaux de FAI : intégration de DiffServ et de l’ingénierie de trafic basée sur MPLS." Ecole Centrale de Lille, 2006. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2006/50376-2006-Kyeongja.pdf.
Full textMultipath routing is a mechanism for load balancing in which the total load is spatially distributed over several paths. It can reduce congestion probability given by routing into the shortest path in the current Internet. LSPs of MPLS provide path controllability by explicit route in the connectionless IP network. Multipath routing scheme is composed of two steps, the selection of multiple candidate paths and the traffic splitting among these selected paths. We compare some recent multipath routing algorithms based on MPLS on the point of scalability and stability. Among them, we pick up WDP and LDM for our hybrid approach which combines cross-steps of different algorithms. PER algorithm is proposed in the improvement of LDM’s traffic splitting step. Using LDM, WDP and PER, three hybrid QoS algorithms are made. Their performances are proved by simulation that they, especially LBWDP (Load Balancing over Widest Disjoint Paths), are more effective than LDM or MATE. For better QoS guarantee, we integrate DiffServ with our traffic engineering technique (DiffServ-aware MPLS Traffic Engineering : DS-TE). PEMS (PEriodic Multi-Step algorithm in DS-TE network) is proposed as one DS-TE model to differentiate the quality of service according to the class. For PEMS algorithm, we propose a new algorithm to select candidate paths by proper metric of each traffic class. PER algorithm distributes the traffic among its own candidate paths by dynamic metric of requested class. Simulation results using ns-2 showed that PEMS can balance the load less than LBWDP but EF and AF classes can be ensured of the better quality of service than LBWDP
Ledy, Jonathan. "Stratégie d'adaptation de liens sur canaux radios dynamiques pour les communicationsentre véhicules - Optimisation de la qualité de service." Thesis, Poitiers, 2012. http://www.theses.fr/2012POIT2318/document.
Full textThis thesis deals with the optimization of communications in vehicular networks by using arealistic simulation platform. A realistic environment implies the usage of mobility modelsadapted to vehicles and also highly detailed physical models (channel models and digitaltransmission chain).The first part of our work has consisted in the design of a realistic simulation platformdedicated to VANETs (Vehicular Ad hoc NETworks). This platform has been completed by asemi-deterministic propagation model which we have designed. This model called UM-CRThas the advantage to have the same level of realism than a deterministic model while requiringmuch less computation time. This model has been validated by comparison with a deterministicray tracing simulator.We then have used this platform to evaluate routing protocols. The efficiency of different adhoc routing protocols in realistic conditions has led us to focus our study on the family ofreactive protocols. From this evaluation we have selected AODV (Ad hoc On demandDistance Vector) to which we have applied a cross-layer metric in order to reduce theperformance degradation caused by the realistic environment. We then have used a tuningtechnique with reactive protocols. Finally, we have evaluated several SISO and MIMOphysical layers. This work shows that only improvements combined at different levels (physicaland network) can yield a significant increase in performance
Harfouche, Leïla. "Vers une intégration des comportements communautaires dans les réseaux mobiles." Thesis, Paris, CNAM, 2011. http://www.theses.fr/2011CNAM0790/document.
Full textIn our area of Mobile Multimedia, the expansion of wireless networks is dazzling and mobility has become a major issue exacerbated by the significant increase in the number of mobile users.A node operating in a basic mobile network behaves the same way a blind person moving in our universe by developing its own representation with his stick, a mechanism known in the literature as terminal mobility. To reduce this blindness, several methods have been developed that are based on location services and mobility models.A mobility model is then intended to describe in terms of environment, the motion criteria of mobile nodes with the challenge to find models faithful to user behavior.Random models are biased because mobile devices are supported by social beings. This led us to include social elements in our models.We present the existing mobility models and classify them.We define our models, implement them and measure their impact on the network testing.Finally we expand our spectrum by showing that granting social grouping perception to a network routing protocol, can improve its performance
Abadie, Lana. "Une approche "autonomic" pour la configuration d'une expérience PHE (Physique des Hautes Energies) appliquée à LHCb (Large Hadron Collider beauty)." Paris 6, 2006. http://www.theses.fr/2006PA066329.
Full textWANG, CHENGTIAN. "Routage des navires. Modele de routage de voiliers. Formalisation et optimisation par programmation dynamique." Paris 7, 1990. http://www.theses.fr/1990PA077169.
Full textAlvarez-Hamelin, José Ignacio. "Routage dans Internet : trafic autosimilaire, multicast et modèles de typologie." Paris 11, 2002. http://www.theses.fr/2002PA112267.
Full textThe first part of this thesis is dedicated to the study of the Internet topology, and a survey of the Internet models. We present a new model for Internet. This model will allows us to test unicast and multicast routing protocols. The second part is dedicated to multicast protocols. First, we presented a survey of construction technique for multicast trees. We propose two multicast protocols. MSDA protocol optimizes the total delay of multicast messages in a multicast tree. In order to quantify the optimization, we tested MSDA with the topologies obtained with our topology generator. MCT protocol builds the optimal multicast tree according to some predefined quality-of-service parameter. We performed simulations with ARPANET (1995) network topology in order to compare MCT with other classical multicast protocols. These simulations prove the positive impact of MCT for multicast communications. The last part is dedicated to the self-similar model of Internet traffic, and to a new quality-of-service parameter: the probabilistic congestion. This parameter allows the estimation of the rate of packet loss. Probabilistic congestion is adapted to a long-term description of the traffic, and it can be used for unicast routing protocols. We performed a simulation in order to validate our ideas (in the UUNET network and in the generated topologies from our topology model). These simulations prove the usefulness of probabilistic congestion for multicast protocols
Meharouech, Ali Amira. "Wireless body-to-body sensor networks : optimization models and algorithms." Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCB122/document.
Full textMotivated by the rising demand for remote and improved healthcare, while decreasing the cost of using network infrastructures to ensure time and data rate-constrained applications, Wireless Body Area Networks (WBANs) still form a strongly growing research field. Besides, engineers and researchers are investigating new solutions to supplement mobile communications through developing opportunities for cooperative WBANs. In this context, using network users themselves as relays could complement and extend existing infrastructure networks, while improving network capacity and promoting radio spectrum usage. Yet, network operators, that are already planning for the Internet of Things (IoT) and cloud computing technologies integration, should also think about this new possibility of creating a new type of mobile ad hoc network, where network users themselves are used as simplified ad hoc base stations, to fulfill the desire of sharing real-time information between colocated persons carrying body sensors. This emerging type of network is called Body-to-Body Network (BBN). In a BBN, a radio device situated on one person gathers the sensor data from the sensor nodes worn by that person, and transmit them to a transceiver situated on another person in the nearby area, in order to be processed or relayed to other BBN users. BBNs can find applications in a range of areas such as healthcare, team sports, military, entertainment, as well as exciting social networking experiences. Operating in the popular Industrial, Scientific and Medical (ISM) band, the communication links in a BBN will be heavily susceptible to interference between the different radio technologies sharing the limited radio spectrum. Thus, inter-body interference become an important concern for protocol design and quality of service for the BBN end user. Yet, higher layer MAC and networking mechanisms need to be in place to overcome this interference problem. To date, very few studies, that perform in-depth analysis of this type of body-centric scenario, exist. The interference problem in such distributed system, should be tackeled with distributed mechanisms, such as Game Theory. The decision makers in the game are either the WBANs/people forming the BBN or the network operators who control the inter-WBAN communicating devices. These devices have to cope with a limited transmission resource (ISM band) that gives rise to a conflict of interests. This thesis aims at exploring the opportunities to enable inter-WBAN communications by ensuring feasible sharing of the radio spectrum through two challenging research issues. First, mutual and cross-technology interference mitigation, and second, the design of a BBN specific routing protocol applied to an epidemic control application within mass gathering areas, such as the airport, as use case in this thesis. In a first phase, a game theoretical approach is proposed to resolve the distributed interference problem in BBNs. The Socially-aware Interference Mitigation (SIM) game performs twofold: at the WBAN stage, it allocates ZigBee channels to body sensors for intra-WBAN data sensing, and at the BBN stage, it allocates WiFi channels to mobile devices for inter-WBAN data transmitting and relaying. Two algorithms, BR-SIM and SORT-SIM, were developed to search for Nash equilibra to the SIM game. The first (BR-SIM) ensures best response solutions while the second (SORT-SIM) attempts to achieve tradeoff between sub-optimal solutions and short convergence time. Then, in order to highlight the social role of BBNs, the second part of this thesis is devoted to propose an epidemic control application tailored to BBNs, in indoor environment. This application implements a geographic routing protocol, that differentiates WBANs traffic and ensures real-time quarantine strategies. (...)
Sadgal, Mohammed. "Contribution à l'étude des problèmes de placement et routage." Lyon 1, 1989. http://www.theses.fr/1989LYO10175.
Full textHaji, Mirsadeghi Mir Omid. "Routage sur les graphes géométriques aléatoires." Paris 6, 2012. http://www.theses.fr/2012PA066204.
Full textThe two first chapters are focused on preliminaries. In Chapter 3 of this thesis, we analyze a class of “Signal to Interference and Noise Ratio” (SINR) random graphs. These random graphs arise in the modeling of packet transmissions in wireless networks. In contrast to previous studies on SINR graphs, we consider both a space and a time dimension. We study optimal paths in such wireless networks in terms of first passage percolation on this random graph. We establish both positive and negative results on the associated time constant. The main negative result states that this time constant is infinite on the random graph associated with a Poisson point process under natural assumptions on the wireless channels. The main positive result states that when adding a periodic node infrastructure of arbitrarily small intensity to the Poisson point process, the time constant is positive and finite. In the second part, we develop a framework for studying point-map invariant measures. We focus on the case of a not necessarily bijective point-map f. We introduce the notion of Point-map Palm version of the point process Φ, which satisfies the desired invariance property when it exists and we give sufficient conditions for it to exist. Chapter 5, explains the connection between Chapters 3 and 4. It generalizes the notion of point-map Palm measures for stochastic point-maps and time dependent point-maps. As we will see in the end of the Chapter 3, the optimal path in the time- space SINR graph is not computable locally in time. This fact leads us to considering suboptimal local algorithms
Lebhar, Emmanuelle. "Algorithmes de routage et modèles aléatoires pour les graphes petits mondes." Phd thesis, Ecole normale supérieure de lyon - ENS LYON, 2005. http://tel.archives-ouvertes.fr/tel-00011646.
Full textMarie, Stéphane. "Routage multi-critère des navires à propulsion hybride." Rennes, INSA, 2010. http://www.theses.fr/2010ISAR0022.
Full textThe work has been carried out within the project Grand Large the aim of which is to introduce an automated system of sail adjustment especially for trawlers and coasters. In this study sail-assisted motor vessels weather routing is investigated to establish the most economical route by applying available information of the ship behavior regarding the encountered sea-conditions. To derive the vessel's fuel use on a route, a fuzzy logic model is constructed through an automated identification process. Only data collected from actual integrated bridge measurements systems is used. Fuzzy modeling is a framework providing a flexible and transparent athematical structure to describe the physical relationships in a vessel behavior. This consumption model is integrated into a determinist weather-routing optimization workflow based on a systematic meshing scheme of the sailing area. Pareto-optimization with a Multi-Objective Genetic Algorithm (MOGA) is used to maximize fuel economy in a limited or optimum time. The benefits of the developed decision helping tool in sail-assisted motor vessel routing are highlighted on a westbound north Transatlantic journey
Ait, Ali Kahina. "Modélisation et étude de performances dans les réseaux VANET." Phd thesis, Université de Technologie de Belfort-Montbeliard, 2012. http://tel.archives-ouvertes.fr/tel-00827552.
Full textNguyen, Viet Phuong. "Modèles et méthodes pour le problème de localisation-routage à deux niveaux en transport." Troyes, 2011. http://www.theses.fr/2011TROY0017.
Full textThe two-echelon location-routing problem (LRP-2E) arises from recent transportation applications, especially in urban logistics. We have to simultaneously locate satellite depots (platforms) from a set of potential sites and to build vehicle routes for two levels : first-level trips which serve from a main depot a set of satellites, and second-level trips which visit customers from these satellites. Hence, the LRP-2E combines two types of decisions : strategic (location of satellites) and tactical or operational (construction of vehicle routes at each level of the system). The objective function, to be minimized, is the total system cost, which includes the opening cost of the selected satellites, the fixed costs of vehicles involved and the transportation costs for the tips of the two levels. The motivation of our work is to solve a NP-hard combinatorial optimization problem, still seldom studied in the literature. We propose solution methods, without hierarchy between the two levels, usins constructive heuristics and hybrid metaheuristics, but also an exact approach based on new mathematical fomulrations. The methods developed are tested on sets of instances with up to 200 customers and 20 potential sites for the satellites
Zhao, Xin. "Une méthode génétique pour la résolution du problème dynamique de routage de véhicules avec temps de parcours variables." Artois, 2008. http://www.theses.fr/2008ARTO0204.
Full textWe treat the dynamic vehicle routing problem with time windows (DVRPTW) and the partially dynamic travelling repairman problem (PDTRP) where the inclusion of new customers during the routing execution is possible. In a first approach, we consider speed profiles based on average travel time depending on the time period (morning, noon, afternoon) to reflect the evolution of road traffic. Depending on the connection type between two customers, several profiles can be considered (feeder road, arterial road and freeway). In a second approach, we integrate traffic information obtained in real time to change the speed profile according to the accidents of the road network (congestion, etc. ). The analysis of the results of these experiments shows that our method with real-time traffic information provides a good performance, a better robustness against a simple model with time dependent travel time
Abdulalli, Abusaif. "Reseaux ad-hoc : étude de modèles de mobilité et de protocoles de routage minimisant la consommation d'énergie." Valenciennes, 2008. http://ged.univ-valenciennes.fr/nuxeo/site/esupversions/9d7396e4-4c5f-40f5-bee2-d336b156addc.
Full textWireless ad-hoc networks became more and more popular in the past few years, owing to their use of deployment. In such a network, the hosts (or nodes) exchange data packets via radio links, without resorting to any hierarchic scheme nor supervisory control. In fact, the data transfers are driven by special distributed routing protocols and each node may potentially contribute in the data transportation from some source to some destination. The main resulting problems are the node mobility (which complicate routing protocols), as well as the limitations of the available frequency bandwidth (and thus of the data flow rate) and of the available energy consumption (related to the more or less extended lifetime of batteries). Mobility, energy consumption minimization and suited routing protocols are the key points of our study. The existing mobility models have thus been looked over first and, using simulation, the characteristics of the corresponding modeled trajectories together with the effects on energy consumption have been studied. Next, the leading routing protocols have been detailed, their impact on energy consumption and the influence of node mobility have been considered (using again simulation). Finally, a new protocol, called LEMFN, has been introduced, which consists in the fusion and extension of two already known protocols, with the main objective of energy consumption reduction in mind. The new algorithm has been studied by simulation and compared to other ones
Aguir, Mohamed Salah. "Modèles stochastiques pour l'aide à la décision dans les centres d'appels." Phd thesis, Ecole Centrale Paris, 2004. http://tel.archives-ouvertes.fr/tel-00376312.
Full textDans la première partie de ce travail, nous étudions le phénomène de rappels. Nous commençons, d'abord, par montrer son importance dans le système. Par la suite, nous montrons que le fait d'ignorer ce phénomène engendre beaucoup d'erreurs lors du dimensionnement du centre d'appels et se traduit par des objectifs non satisfaits ou par un système surdimensionné sujet à des coûts supplémentaires. Cette analyse concerne le régime stationnaire. L'étude du système multi-période aboutit, elle, à la détermination de l'évolution de la demande réelle en fonction du temps et ce, à partir des arrivées observées.
Dans la deuxième partie, nous commençons par proposer des estimateurs du temps d'attente que les clients doivent passer dans la file avant d'être servis et ce, pour des clients répartis en plusieurs classes de priorité non-préemptive. En fonction de ces estimateurs, nous étudions plusieurs règles de routage. Nous comparons le système composé de plusieurs files d'attente, et nécessitant donc un routage, avec le système où les files d'attente sont fusionnées. Nous terminons cette partie par une analyse de deux disciplines de priorités probabilistes et nous les comparons avec la discipline de la priorité stricte. Comme dans le cas du routage, la comparaison s'effectue en fonction du nombre de conseillers nécessaires à la satisfaction de qualités de service objectif pour chaque classe de clients
Faheem, Yasir. "Routage avec économie d'énergie dans les réseaux de capteurs sans fils." Paris 13, 2012. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_faheem.pdf.
Full textLimited battery power is one of the major stringent factors in deploying Wireless Sensor Networks (WSNs), in spite of their numerous applications both on small scale as inWireless Body Area Networks (WBANs) and on large scale as in agricultural and habitat monitoring. Especially, stationary sink based data gathering protocols for large scaleWSNs have limited network lifetime, because relay nodes around the sink quickly deplete their battery power due to high traffic loads, making the rest of the network unreachable to the sink. On the other hand, sink mobility improves network lifetime by distributing relay nodes’ energy consumption. However, mobile sink now has to periodically update the network about its changing position. This control traffic is non-negligible for low power, limited capacity sensors as it induces energy consumption problem. In this thesis, we are considering energy efficient routing protocols in the context of WBANs and large scale WSNs. Moreover, we also address multi-channel assignment algorithm with the aim of minimizing power consumption and increasing network throughput. In the first part of this thesis, a deep analysis of the energy consumption of one hop vs multi-hop communications in WBANs is performed. In fact, recent advances in technology has led to the development of small, intelligent, wearable sensors which are capable of remotely performing critical health monitoring tasks, and then transmitting patient’s data back to health care centers over wireless medium. But to the day, energy also remains to be a big constraint in enhancing WBAN lifetime [Net12]. Some recent literature on WBANs proposes deliberate use of multi-hops to transfer data from a sensor to the gateway via relay health sensors as more energy efficient than single hop communication. There are studies which argue contrarily. In this context, we have analyzed the single vs multi-hop energy consumption effect for real very short range sensor devices. In the second part of this thesis, two distributed energy-efficient sink location update algorithms are proposed for large scale mobile sink WSNs. First algorithm, named SN- MPR, uses a combination of multi-point relay broadcast and a local path repair mechanism by means of which sink’s location update packets are forwarded only to nodes which are affected by sink mobility; the rest of the network does not receive these update messages. Next, a duty-cycle aware multi-point relay based algorithm which is a modified version of the SN-MPR algorithm is proposed. It allows non-relay nodes to switch-off their radios when communication is not desired. Simulation results show that the two aforementioned algorithms minimize network’s power consumption without compromising data delivery efficiency. The final part of this thesis deals with traffic-aware channel assignment problem in IEEE 802. 15. 4 standard-based heterogeneous WSNs which have rather high traffic rate requirements than low-rate scalar WSN applications. In fact, traditional single channel communication suffers from interferences caused by concurrent transmissions in the same neighborhood. These parallel transmissions waste battery power as multiple retransmis- sions are required before a packet can be successfully delivered at the destination due to frequent collisions. Moreover, already limited network throughput of the single channel communication protocols is further degraded at higher traffic rates due to increased colli-sions and congestion. On the other hand, concurrent transmissions over multiple channels not only reduce power consumption as packet collisions are minimized or eliminated depend- ing upon the efficiency of the concerned channel assignment algorithm, but also offer better network throughput and data delivery delays. Modern WSN platforms like crossbow’s Mi-caZ nodes [Mot12] are equipped with single, half-duplex IEEE 802. 15. 4 standard-based radio which can operate over sixteen multiple channels. In order to make effective use of multiple channels, a number of channel assignment algorithms have been proposed recently for WSNs. However, they are suitable for rather low-rate homogeneous WSNs, and they consider fixed physical channel widths. These multi-channel assignments increase network throughput, but they may not be able to ensure QoS requirements of high bandwidth de- manding multimedia traffic, as in the case of heterogeneous WSNs. In order to address the energy issue and at the same time increase network capacity, we propose a distributive Traffic-Aware Bandwidth-Adaptive (TABA) channel selection algorithm which enables the nodes to not only choose interference free channels in the neighborhood, but also to adapt channel-width to increase/decrease throughput according to varying traffic conditions
Nguyen, Anh-Dung. "Contributions to modeling, structural analysis, and routing performance in dynamic networks." Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/9725/1/nguyen.pdf.
Full textSouza, Mauricio Cardoso de. "Modèles continus et algorithmes de résolution pour les problèmes de routage et d'expansion de capacités des réseaux de communications." Clermont-Ferrand 2, 2002. http://www.theses.fr/2002CLF22381.
Full textPeng, Zhongren. "A Simultaneous Route-level Transit Patronage Model: Demand, Supply, and Inter-route Relationship." PDXScholar, 1994. https://pdxscholar.library.pdx.edu/open_access_etds/1159.
Full textCostantini, Hervé. "La mobilité sociale : Modèles et traces." Phd thesis, Conservatoire national des arts et metiers - CNAM, 2012. http://tel.archives-ouvertes.fr/tel-00770978.
Full textYu, Shaohua. "Optimization models and methods for tour planning in smart urban logistics." Thesis, université Paris-Saclay, 2020. http://www.theses.fr/2020UPAST045.
Full textUrban distribution refers to the distribution activities of goods serving urban areas and suburbs. Recent technological advances in unmanned distribution field, as well as new regulations limiting the use of combustion engine vehicles, will significantly change urban goods distribution. Besides, the new ecommerce business model also brings new opportunities and challenges to urban goods distribution. This thesis focuses on a novel distribution system to provide better services for urban logistics distribution. We first study a van-based robot urban delivery system and allow a van can carry multiple robot to make the distribution system more flexible. Then we incorporate en-route charging, and reverse charging technology into the van-based robot urban delivery system in logistics operations, to effectively use the time during which electric vans are carrying robots to recharge the robots, thereby increasing distribution systems’ efficiency. Finally, we incorporate hybrid pickup and delivery operations into the van-based robot urban distribution system to adapt to the new business model of e-commerce enterprises
González, Ramírez Humberto. "Study of the choice behaviour of travellers in a transport network via a “simulation game” Travel time and bounded rationality in travellers’ route choice behaviour : a computer route choice experiment Unravelling travellers’ route choice behaviour at full-scale urban network by focusing on representative OD pairs in computer experiments." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSET008.
Full textThe objective of this thesis is to find route choice models that scale-up at network level, i.e., models that predict the choices of travellers over the diversity of situations found in a transport network. The approach in this thesis to investigate travellers' behaviour in transportation networks is through computer-based experiments at large scale, for which a platform named the Mobility Decision Game (MDG), has been developed. The MDG permits to observe the choices of the participants on a diverse set of scenarios (OD pairs and routes) with varying traffic conditions and travel time information. In this thesis, the experiments focus on the route choices of uni-modal car trips that are based on the map of the city of Lyon, France. To attain the objective of this thesis, firstly a methodology to find OD pairs that are representative of the network is proposed. The representative OD pairs are used in route choice experiments to obtain choice models that generalise to the various OD configurations in the network. Secondly, the choices of participants in the experiments are analysed from the rational and boundedly rational behaviour perspectives, in order to establish the principle that best describe their choices. Finally, the choice models are assessed in terms of their predictive accuracy. This thesis is part of a European ERC project entitled MAGnUM: Multiscale and Multimodal Traffic Modeling Approach for Sustainable Management of Urban Mobility
Nott, David. "Modélisation et évaluation de performances des algorithmes liés au routage de paquets de taille fixe dans le réseau de coeur ROMéO." Versailles-St Quentin en Yvelines, 2009. http://www.theses.fr/2009VERS0039.
Full textLa technologie tout-optique représente une technologie séduisante et prometteuse pour les réseaux du futur. La faisabilité et les performances d'un réseau tout-optique ont été étudiées dans le projet ROM. Avec le tout-optique, la transmission et la commutation des paquets sont effectuées en optique. La mémoire optique n'est pas ou peu disponible. Le routage le plus étudié pour le tout-optique est le routage à déflexion qui offre un bon débit mais dont la queue de la distribution de transport n'est pas bornée. Le routage eulérien offre une garantie de terminaison au transport des paquets, mais un faible débit. Le routage mixte est une combinaison du routage à déflexion et du routage eulérien dans laquelle un paquet débute en mode déflexion, et s'il prend trop de temps pour sortir du réseau, finit son transport en mode eulérien. Cette thèse poursuit les travaux de ROM dans le projet ROMéO en considérant l'aspect routage d'un réseau tout-optique. Le premier aspect étudié porte sur l'évaluation de performance du routage à déflexion, avec comme critère de performance, la probabilité d'un paquet de subir une déflexion et la distribution du temps de transport. Le second aspect étudié porte sur le routage mixte. D'une part, nous proposons des algorithmes pour construire des circuits eulériens en abaissant la garantie de terminaison du routage mixte. D'autre part, nous mettons en évidence la vulnérabilité du routage mixte face à une congestion. Nous montrons que le débit du routage mixte baisse significativement à la suite d'une rafale de trafic et que le débit du réseau peut ne pas remonter, même après la fin de la rafale de trafic. Nous montrons qu'un contrôle d'accès à l'entrée du réseau permet de prévenir la congestion et de sortir le réseau d'une congestion
Viana, Aline Carneiro. "Localisation et routage dans les réseaux auto organisables à large échelle : des tables de hachage distribuées aux structures d'adressage adaptatives." Paris 6, 2005. http://www.theses.fr/2005PA066191.
Full textZeddini, Besma. "Modèles d'auto-organisation multi-agents pour le problème de transport à la demande." Le Havre, 2009. http://www.theses.fr/2009LEHA0025.
Full textThis PhD thesis is motivated by the proposal of multiagent models for the Dial A Ride Problem with Time Windows (DARPTW). The DARPTW is a highly complex dynamic problem, for which a multiagent design is relevent. Our proposals focus on Self-Organization models in multiagent systems that allows for the consideration of new criteria for the assessment of the proposed systems, which with the strict consideration of the utility of the transport operator. In our work, we propose several multiagent architectures for the implementation of the DARPTW system. After experimentally evaluating the different architectures, we popose algorrithmic improvements of the best architecture. The objective of these improvements is to palliate the drawbacks related to the myopic behavior of insertion heuristics and the sequentiality of their insertion process. On the one side, we relax the constraint on the non-revokation of assignment decisions by allowing vehicles to exchange customers that they have inserted. On the other side, by adopting an extension of the Contract Net Protocol, we propose to Vehicle agents to process several customers in parallel. The third contribution of this PhD thesis is the proposal of two Self-Organization models (spatial and temporal) allowing a better spatial and temporal coverage of the network. A set of experiments validate our proposals. Finally, we implement a platform allowing for the deployment of DARPTW systems
Witkowski, Walter Roy 1961. "SIMULATION ROUTINE FOR THE STUDY OF TRANSIENT BEHAVIOR OF CHEMICAL PROCESSES." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/276537.
Full textFadaei, Oshyani Masoud. "Estimating route choice models using low frequency GPS data." Thesis, KTH, Transportvetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-41546.
Full textZhou, Tianyu. "Deep Learning Models for Route Planning in Road Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-235216.
Full textTraditionella algoritmer för att hitta den kortaste vägen kan effektivt hitta de optimala vägarna i grafer med enkel heuristik. Att formulera en enkel heuristik är dock utmanande för vägnätverk eftersom det finns flera faktorer att överväga, såsom vägsegmentlängd, kantcentralitet och hastighetsbegränsningar. Denna studie undersöker hur ett neuralt nätverk kan lära sig att ta dessa faktorer som indata och finna en väg utifrån start- och slutpunkt. Forskningsfrågan är formulerad som: Är neuronnätverket tillämpliga på realtidsplaneringsuppgifter i ett vägnät?. Det föreslagna måttet för att utvärdera effektiviteten hos det neuronnätverket är ankomstgrad. Kvaliteten på genererade vägar utvärderas av tidseffektivitet. Prestandan hos modellen jämförs också mellan sökningen i dynamiska och statiska grafer, med hjälp av ovanstående mätvärden. Undersökningen bedrivs i flera steg. Det första steget är att generera slumpmässiga grafer, vilket gör det möjligt för oss att övervaka träningsdiagrammets storlek och egenskaper utan att ta hand om för många detaljer i ett vägnät. Nästa steg är att, som ett bevis på konceptet, undersöka om ett neuronnätverk kan lära sig att korsa enkla grafer med flera strategier, eftersom vägnätverk är i praktiken komplexa grafer. Slutligen skalas studien upp genom att inkludera faktorer som kan påverka sökningen i riktiga vägnät. Träningsdata utgörs av optimala vägar i en graf som genereras av en algoritm för att finna den kortaste vägen. Modellen appliceras sedan i nya grafer för att hitta en väg mellan start och slutpunkt. Ankomstgrad och tidseffektivitet beräknas och jämförs med den motsvarande optimala sökvägen. De experimentella resultaten visar att effektiviteten, dvs ankomstgraden av modellen är 90% och vägkvaliteten dvs tidseffektiviteten har en median på 0,88 och en stor varians. Experimentet visar att modellen har bättre prestanda i dynamiska grafer än i statiska grafer. Sammantaget är svaret på forskningsfrågan positivt. Det finns dock fortfarande utrymme att förbättra modellens effektivitet och de vägar som genereras av modellen. Detta arbete visar att ett neuronnätverk tränat för att göra lokalt optimala val knappast kan ge globalt optimal lösning. Vi visar också att vår metod, som bara gör lokalt optimala val, kan anpassa sig till dynamiska grafer med begränsad prestandaförlust.
Jouini, Oualid. "Modèles Stochastiques pour l'Aide à la Décision dans les Centres d'appels." Phd thesis, Ecole Centrale Paris, 2006. http://tel.archives-ouvertes.fr/tel-00133341.
Full textDans la première partie, nous considérons un centre d'appels où tous les agents sont groupés dans un même pool et les clients sont traités indifféremment par un des agents. Nous étudions les bénéfices de la migration depuis cette configuration vers un centre d'appels où les clients sont divisés en classes (appelées portefeuilles de clients). Chaque portefeuille de clients est servi par un pool de conseillers qui lui est exclusivement dédié. Ensuite, nous considérons un centre d'appels avec deux classes de clients impatients. Nous développons des politiques dynamiques pour l'affectation des clients (selon leurs types) aux différentes files d'attente. L'objectif étant lié aux qualités de service différentiées exprimées en terme du pourcentage des clients perdus, ainsi qu'en terme de la variance du temps d'attente. Enfin, nous étudions un centre d'appels qui annonce le délai d'attente à chaque nouveau client. Nous montrons les avantages de l'annonce sur les performances du centre d'appels.
Dans la deuxième partie, nous considérons un processus de naissance et de mort de forme générale. Nous calculons ensuite les moments de plusieurs variables aléatoires liées aux temps de premiers passages (ordinaires et conditionnels). Ensuite, nous montrons un résultat de concavité dans une file d'attente avec capacité limitée et avec une seule classe de clients impatients. Nous démontrons que la probabilité d'entrer en service est strictement croissante et concave en fonction de la taille de la file d'attente.
Jamet, Raphaël. "Protocols and models for the security of wireless ad-hoc networks." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM039/document.
Full textIn this document, we focus on ways of increasing the security of wireless ad-hoc networks. These networks, and more specifically wireless sensor networks, look increasingly like the right answer to a lot of problem, such as data collection over a large area, or providing emergency network infrastructure after a disaster. They are also inherently exposed to malicious intents due to their collaborative nature. In order to protect them, we focus on the security aspects of the protocols built for these networks. We first propose a Secure and Resilient Reputation-based Routing protocol, called SR3. This protocol routes messages according to a reputation metric built using only trusted information. This protocol achieves data confidentiality and data packet unforgeability, which we prove formally using two verification tools: CryptoVerif and Scyther. We experimentally show the resiliency of SR3 against various attack scenarios, and we compared our results to several routing algorithms of the literature. This evaluation shows that both the resiliency and fairness accomplished by SR3 are better than for those others protocols, especially when the network is sparse. Moreover, and unlike previous solutions, if the compromised nodes behavior changes, then SR3 will self-adapt in order to ensure an acceptable quality of service. Analyses of routing protocols security are nearly always supported by simulations, which often evaluate the ability to deliver messages to a given destination. Several competing definitions for secure routing exist, but to our knowledge, they only address source routing protocols. We propose the notion of incorruptibility, a quantitative computational definition for routing security based on the attacker's ability to alter the routes used by messages. These definitions are then illustrated with several routing algorithms. Finally, we study Intrusion Detection Systems (IDS) for WANET, and more specifically their inputs. These systems provide a supplementary layer of defenses for WANETs, and they are able to easily detect attacks who are complicated for the network protocols. We classify the different inputs used by the decision process of these IDS, according to their level of required cooperation, and the source of their data. We then propose the InDICE tool, a decision aid which, given an IDS, allows automated discovery of undetectable attacks according to the inputs used by that IDS. In the end, we apply our framework to discover weaknesses in two existing IDS
Bourdet, Nicolas. "Biomécanique de la colonne cervicale humaine in vivo : Caractérisation modale et modélisation." Université Louis Pasteur (Strasbourg) (1971-2008), 2004. http://www.theses.fr/2004STR13214.
Full textD'Amours, Monia. "Modèle d'analyse zonale des accidents de la route en milieu urbain, le cas de Sherbrooke, 1986 et 1991." Mémoire, Université de Sherbrooke, 1994. http://hdl.handle.net/11143/8639.
Full textChatterjee, Kiron. "The development and role of accident predictive models." Thesis, University of Southampton, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.261904.
Full textThimon, Bozec Sophie. "La fabrique d'une compétence stratégique, proposition d'un modèle : une application aux impacts des usages des technologies de l'information en PME." Thesis, Brest, 2016. http://www.theses.fr/2016BRES0097/document.
Full textOur research object is twofold: understand a strategic organizational competences bulding using IT, on the one hand, and go beyond the existing analysis of impacts of the IT models, integrating a multidimensional approach, on the other hand. We privileged an empirical approach beginning with a pilot case study that allowed us to define a theoretical framework of an abductive way, by a constant back and forth between the field and the theoretical existing constructs. The conceptual framework is a synthesis of the various RBV strands integrating the concept of organizational learning. The results of a multicase study underline the diffused and partially intentional character of a process, requiring interaction of additional resources highly dependent from the past, and leading to improve efficiency of the routines and dynamic adaptability. We propose a design of the process and discuss significant concepts for the study of this phenomenon
Bracka, Pirro. "Une architecture de contrôle de mobilité pour le routage de messages dans un réseau ad hoc de grande taille." Phd thesis, Université de Marne la Vallée, 2005. http://tel.archives-ouvertes.fr/tel-00628700.
Full textMcNeeley, Susan. "Street Codes, Routine Activities, Neighborhood Context, and Victimization: An Examination of Alternative Models." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1382951840.
Full text