• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 239
  • 57
  • 52
  • 31
  • 24
  • 13
  • 10
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 525
  • 169
  • 139
  • 89
  • 86
  • 84
  • 83
  • 78
  • 77
  • 77
  • 74
  • 51
  • 51
  • 47
  • 46
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Schémas volumes finis à mailles décalées pour la dynamique des gaz / Finite volume schemes on staggered grids for gas dynamics

Llobell, Julie 24 October 2018 (has links)
L'objectif de cette thèse est de développer un nouveau schéma numérique du type volumes finis pour la dynamique des gaz. Dans deux articles, F.Berthelin, T.Goudon et S.Minjeaud proposent de résoudre le système des équations d'Euler barotrope en dimension 1 d'espace, avec un schéma d'ordre 1 fonctionnant sur grilles décalées et dont la conception des flux est inspirée des schémas cinétiques. Nous proposons d'enrichir ce schéma afin qu'il puisse résoudre le système des équations d'Euler barotrope ou complet, en dimension 2 d'espace sur maillage cartésien ou non structuré, possiblement à l'ordre 2 et le cas échéant à bas nombres de Mach. Nous commencerons par développer une version 2D du schéma sur grilles cartésiennes (ou MAC) à l’ordre 2 via une méthode de type MUSCL, d'abord pour les équations barotropes puis pour les équations complètes. Ces dernières demandent de traiter une équation d’énergie supplémentaire et l’un des problèmes -résolu- est de trouver une définition discrète convenable de l’énergie totale telle qu'elle satisfasse une équation conservative locale. Dans un troisième chapitre nous étudierons le passage à la limite du compressible vers l'incompressible et nous verrons comment utiliser les atouts de notre schéma afin de le modifier et d'en faire un schéma Asymptotic Preserving pour des écoulements à bas nombres de Mach. Dans un quatrième temps nous proposerons une adaptation du schéma sur des maillages non structurés. Notre approche sera fortement inspirée des méthodes DDFV et pourra présenter des avantages dans les régimes à faibles nombres de Mach. Cette thèse se termine par un cinquième chapitre issu d’une collaboration lors du CEMRACS 2017, où le point de vue considéré n’est plus macroscopique mais microscopique. Nous commencerons par étudier un modèle micro/macro idéalisé auquel un processus stochastique a été ajouté puis nous tenterons d'en déduire un modèle à grande échelle pour un système fortement couplé, qui soit consistant avec la description micro/macro sous-jacente du problème physique. / The objective of this thesis is to develop a new numerical scheme of finite volume type for gas dynamics. In two articles, F.Berthelin, T.Goudon and S.Minjeaud propose to solve the barotropic Euler system in dimension 1 of space, with a first order scheme that works on staggered grids and of which fluxes are inspired by kinetic schemes. We propose to enhance this scheme so that it can solve the barotropic or complete Euler systems, in dimension 2 of space on Cartesian or unstructured grids, possibly at order 2 and at Low Mach numbers where appropriate. We begin with the development of a 2D version of the scheme on Cartesian (or MAC) grids, at order 2 via a MUSCL type method, for the barotropic equations at first and then for the complete equations. The latter require to handle with an additional energy equation and one of the -solved- problems is to find a suitable discrete definition of the total energy such that it satisfies a local conservative equation. In a third chapter we study the transition from the compressible case to the incompressible limit and we shall see how to use the advantages of our initial scheme in order to make it an Asymptotic Preserving scheme at low Mach numbers. In a fourth chapter we propose an adaptation of the scheme on unstructured meshes. Our approach is strongly inspired by the DDFV methods and may have advantages in low-Mach regimes.This thesis ends with a fifth chapter issued from a collaboration during CEMRACS 2017, where the considered point of view is no longer macroscopic but microscopic. We begin by studying a simplified micro/macro model with an added stochastic process and then we attempt to deduce a large-scale model for a strongly coupled system which has to be consistent with the underlying micro / macro description of the physical problem.
202

Analysis of the Cost of Handover in a Mobile Wireless Sensor Network

Dong, Qian 26 February 2013 (has links)
Handling mobility in wireless sensor networks can pose formidable challenges in protocol design, especially, at the link layer. Since most of the proposed Medium Access Control (MAC) protocols do not accommodate mobility, a node has two options to deal with a deteriorating link: (a) to continue data transmission until the link breaks and then establishes a new link with a new relay node; or (b) to seamlessly transfer the communication to a better link parallel to the data transmission over the existing link. Different from option (a) where a node can only search for a new link after the original link disrupts, option (b) enables a node to perceive the change in the quality of a link in advance. The link quality prediction is implemented by an adaptive handover mechanism. Both approaches will inevitably introduce latency. This thesis aims to quantify and compare such latency. Specifically, it investigates the latency of packet transmission in a mobile wireless sensor network with and without the support of a handover mechanism. To start with, the thesis elaborates the effect of mobility on the performance of the existing MAC protocols, and the need to maintain an unbroken link during data transmission. To implement the handover, a target MAC protocol is required to be selected first. Since the Receiver-Initiated MAC protocol (RI-MAC) uses only short beacon and data packets during communication that substantially reduce overhearing, collision probability and data recovery cost, it is chosen as the carrier for the latency evaluation. Even though RI-MAC performs well in many aspects, it has several demerits. To address the monotonous increment in the backoff window size and to reduce the occurrence frequency of the dwell time, a burst data transmission pattern is adopted to optimize RI-MAC. With the optimization, the protocol reduces the long idle listening time that a node has to wait before data transmission, and thus, works well in a static scenario. However, due to the high probability of link disconnection, the burst data transmission does not perform well in case of mobility. For the sake of accommodating mobility, an adaptive handover mechanism is developed on top of the optimized RI-MAC. Once a node evaluates that the data packets cannot be completely transmitted before the link terminates, it will search for a new relay node while keeping communicating with the original collaborator. It is implemented by embedding a neighbor discovery request in a data packet that will be transmitted in a broadcast channel. Neighbors of the node will participate in the handover process as long as they are in an active state and their distance to the transmitter does not exceed a pre-defined threshold. As a proof-of-concept for the handover mechanism, a mathematical model is established. The transmission rate, the moving speed of human beings, the duty cycle and the network density are all taken into consideration. The analytical result shows that the communication latency decreases with an increment in the network density and the duty cycle when the handover mechanism is used, whereas the latency exhibits a reverse trend when the handover mechanism is not used. To validate the mathematics-based evaluation, the NS2 network simulator is employed. The simulation result is found to perform in accordance with the analytical result. It is asserted that the latency of packet transmission with the handover support is much less than that without the handover support. The communication latency can be saved by at least 0.28s when the handover mechanism is applied. This figure can even grow as the duty cycle and the network density increase. From this perspective, the handover mechanism is verified to improve the latency of packet transmission as far as mobility is concerned.
203

Cryptanalyse des algorithmes de type Even-Mansour / Cryptanalysis of Even-Mansour type algorithms

Mavromati, Chrysanthi 24 January 2017 (has links)
Les algorithmes cryptographiques actuels se répartissent en deux grandes familles : les algorithmes symétriques et les algorithmes asymétriques. En 1991, S. Even et Y. Mansour ont proposé une construction simple d'un algorithme de chiffrement par blocs en utilisant une permutation aléatoire. Récemment, surtout pour répondre aux nouveaux enjeux de la cryptographie à bas coût, plusieurs algorithmes ont été proposés dont la construction est basée sur le schéma Even-Mansour. Les travaux réalisés dans cette thèse ont pour objet l'analyse de ce type d'algorithmes. À cette fin, nous proposons une nouvelle attaque générique sur le schéma Even-Mansour. Ensuite, afin de montrer l'importance particulière du modèle multi-utilisateurs, nous appliquons cette attaque générique dans ce modèle. Ces deux attaques sur Even-Mansour introduisent deux nouvelles idées algorithmiques : les chaînes parallèles et la construction d'un graphe qui illustre les liens entre les clés des utilisateurs du modèle multi-utilisateurs. Finalement, basés sur ces idées, nous proposons des attaques sur les algorithmes de chiffrement par blocs DESX et PRINCE et sur le code d'authentification de message Chaskey. / Current cryptographic algorithms are divided into two families: secret-key algorithms (or symmetric algorithms) and public-key algorithms. Secret-key cryptography is characterized by the sharing of the same key K used by both legitimate users of the cryptosystem. Bloc ciphers are one of the main primitives of symmetric cryptography. In 1991, S. Even and Y. Mansour proposed a minimal construction of a bloc cipher which uses a random permutation. Recently, in the context of lightweight cryptography, many algorithms based on the Even-Mansour scheme have been proposed. In this thesis, we focus on the analysis of this type of algorithms. To this purpose, we propose a generic attack on the Even-Mansour scheme. To show the particular importance of the multi-user model, we adapt our attack to this context. With these attacks, we introduce two new algorithmic ideas: the parallel chains and the construction of graph which represents the relations between the keys of the users of the multi-user model. Finally, we use these ideas and we present attacks on the bloc ciphers DESX and PRINCE and on the message authentication code (MAC) Chaskey.
204

Enhancing Mobility in Low Power Wireless Sensor Networks

Wen, Jianjun 29 October 2018 (has links)
In the early stages of wireless sensor networks (WSNs), low data rate traffic patterns are assumed as applications have a single purpose with simple sensing task and data packets are generated at a rate of minutes or hours. As such, most of the proposed communication protocols focus on energy efficiency rather than high throughput. Emerging high data rate applications motivate bulk data transfer protocols to achieve high throughput. The basic idea is to enable nodes to transmit a sequence of packets in burst once they obtain a medium. However, due to the low-power, low-cost nature, the transceiver used in wireless sensor networks is prone to packet loss. Especially when the transmitters are mobile, packet loss becomes worse. To reduce the energy expenditure caused by packet loss and retransmission, a burst transmission scheme is required that can adapt to the link dynamics and estimate the number of packets to transmit in burst. As the mobile node is moving within the network, it cannot always maintain a stable link with one specific stationary node. When link deterioration is constantly detected, the mobile node has to initiate a handover process to seamlessly transfer the communication to a new relay node before the current link breaks. For this reason, it is vital for a mobile node to (1) determine whether a fluctuation in link quality eventually results in a disconnection, (2) foresee potential disconnection well ahead of time and establish an alternative link before the disconnection occurs, and (3) seamlessly transfer communication to the new link. In this dissertation, we focus on dealing with burst transmission and handover issues in low power mobile wireless sensor networks. To this end, we begin with designing a novel mobility enabled testing framework as the evaluation testbed for all our remaining studies. We then perform an empirical study to investigate the link characteristics in mobile environments. Using these observations as guidelines, we propose three algorithms related to mobility that will improve network performance in terms of latency and throughput: i) Mobility Enabled Testing Framework (MobiLab). Considering the high fluctuation of link quality during mobility, protocols supporting mobile wireless sensor nodes should be rigorously tested to ensure that they produce predictable outcomes before actual deployment. Furthermore, considering the typical size of wireless sensor networks and the number of parameters that can be configured or tuned, conducting repeated and reproducible experiments can be both time consuming and costly. The conventional method for evaluating the performance of different protocols and algorithms under different network configurations is to change the source code and reprogram the testbed, which requires considerable effort. To this end, we present a mobility enabled testbed for carrying out repeated and reproducible experiments, independent of the application or protocol types which should be tested. The testbed consists of, among others, a server side control station and a client side traffic ow controller which coordinates inter- and intra-experiment activities. ii) Adaptive Burst Transmission Scheme for Dynamic Environment. Emerging high data rate applications motivate bulk data transfer protocol to achieve high throughput. The basic idea is to enable nodes to transmit a sequence of packets in burst once they obtain a medium. Due to the low-power and low-cost nature, the transceiver used in wireless sensor networks is prone to packet loss. When the transmitter is mobile, packet loss becomes even worse. The existing bulk data transfer protocols are not energy efficient since they keep their radios on even while a large number of consecutive packet losses occur. To address this challenge, we propose an adaptive burst transmission scheme (ABTS). In the design of the ABTS, we estimate the expected duration in which the quality of a specific link remains stable using the conditional distribution function of the signal-to-noise ratio (SNR) of received acknowledgment packets. We exploit the expected duration to determine the number of packets to transmit in burst and the duration of the sleeping period. iii) Kalman Filter Based Handover Triggering Algorithm (KMF). Maintaining a stable link in mobile wireless sensor network is challenging. In the design of the KMF, we utilized combined link quality metrics in physical and link layers, such as Received Signal Strength Indicator (RSSI) and packet success rate (PSR), to estimate link quality fluctuation online. Then Kalman filter is adopted to predict link dynamics ahead of time. If a predicted link quality fulfills handover trigger criterion, a handover process will be initiated to discover alternative relay nodes and establish a new link before the disconnection occurs. iv) Mobile Sender Initiated MAC Protocol (MSI-MAC). In cellular networks, mobile stations are always associated with the nearest base station through intra- and inter-cellular handover. The underlying process is that the quality of an established link is continually evaluated and handover decisions are made by resource rich base stations. In wireless sensor networks, should a seamless handover be carried out, the task has to be accomplished by energy-constraint, resource-limited, and low-power wireless sensor nodes in a distributed manner. To this end, we present MSI-MAC, a mobile sender initiated MAC protocol to enable seamless handover.
205

Modelling the risk of rainfall events leading to momentary pollution levels exceeding maximum allowed concentrations - A Swedish case study of urban runoff in the Fyris river / Modellering av risken att regntillfällen leder till tillfälliga föroreningskoncentrationer som överskriver maximala tillåtna koncentrationer - En svensk fallstudie av dagvatten i Fyrisån

Gannholm Johansson, Tove January 2022 (has links)
The purpose of this study was (1) to study the proportion (X) of the flow in a watercourse that consists of urban runoff during a rain event and (2) to evaluate the risk that a few chosen pollutants, transported by urban runoff, exceed the maximum allowed concentration in the watercourse according to the environmental quality standards (MAC-EQS). The Fyris river in Uppsala, Sweden, was selected as a case study. Urban runoff quickflow was estimated with a water balance model using precipitation data and flow data from three stations. Precipitation data was used to identify 31 rain events with a minimum rain volume of 10 mm and at least a maximum rain intensity of three mm/h during the study period 2017-2020. Pollutants in urban runoff were sampled during the winter of 2020-2021. The highest concentrations obtained during sampling were used to estimate momentary pollution concentration and to evaluate the risk of exceeding MAC-EQS. The highest X found during a rain event was 71%. Low flow conditions in the river prior to a rain event in summertime are circumstances when X can be expected to be high. It is therefore advised to include rain events under such circumstances when monitoring MAC-EQS or sampling momentary pollution concentrations in the Fyris river. The pollutant category polycyclic aromatic hydrocarbons (PAH), and especially the pollutant fluoranthene, showed risk of momentary pollution concentration exceeding MAC-EQS. Therefore, the author recommends that future studies of urban runoff should include PAHs. / Syftet med denna studie var (1) att studera hur stor andel (X) av flödet i ett vattendrag som utgörs av dagvatten vid ett regntillfälle, och (2) att utvärdera risken att ett utvalt antal föroreningar som transporteras med dagvattnet överskrider maximal tillåten koncentration enligt miljökvalitetsnormerna för vatten (MAC-MKN). Fyrisån i Uppsala, Sverige, valdes som fallstudie. Snabbt dagvattenflöde (quickflow) uppskattades med en vattenbalansmodell som använde nederbördsdata samt vattenföring från tre stationer. Nederbördsdata användes för att identifiera 31 regntillfällen med en minsta regnvolym på 10 mm och minst en maximal regnintensitet på tre mm/h under perioden 2017-2020. Föroreningar i dagvatten provtogs under vintern 2020-2021. De högsta koncentrationerna som påträffades vid provtagningen användes för att uppskatta momentan föroreningskoncentration och för att utvärdera risken att MAC-MKN överskrids. Det högsta X som beräknades under ett regntillfälle var 71%. Lågt flöde i Fyrisån innan ett regntillfälle under sommartid är omständigheter när X kan förväntas vara högt. Det rekommenderas därför att inkludera regntillfällen under sådana omständigheter när MAC-MKN övervakas eller när momentana föroreningskoncentrationer i Fyrisån provtas. Föroreningskategorin polycykliska aromatiska kolväten (PAH), och särskilt föroreningen fluoranten, uppvisade risker för att MAC-MKN skulle överskridas. Därför rekommenderas att framtida studier av dagvatten bör inkludera PAH:er.
206

Bluetooth-enheter i offentliga rummet och anonymisering av data

Nilsson, Mattias, Olsson, Sebastian January 2015 (has links)
Internet of Things (IoT) ger stora möjligheter att samla in data för olika syfte som till exempel att estimera antalet personer för att styra värmen i ett rum. Vidare så kan IoT-system automatisera uppgifter som kan hjälpa oss människor. Den här studien syftar till vilken typ av data som kan vara intressant att samla in för att kunna estimera antalet personer på en offentlig plats. Det handlar även om hur känslig data som samlas in kan anonymiseras. För att göra detta så valdes det att undersöka hur MAC-adresser från Bluetooth-enheter skulle fungerar för att uppskatta antalet personer. För att samla in MAC-adresser så utvecklades ett proof of concept-system där en Android-applikation samlade in MAC-adresser som anonymiserades innan de lagrades i en databas. Applikationen anonymiserar den unika MAC-adressen enligt tre nivåer med olika säkerhet. Fältstudier gjordes där antalet personer räknades visuellt sedan gjordes anonymiserade insamlingar av MAC-adresser. Slutsatsen var att Bluetooth blir svårt att använda för att estimera antal personer eftersom alla inte har Bluetooth på. Applikationen som utvecklats påvisar att data kan samlas in säkert och på så sätt inte kränka integritet. / Internet of Things (IoT) provides great opportunities to collect data for different purposes such as to estimate the number of people to control the heat in a room. Furthermore, IoT systems can automate tasks that can help us humans. This study is aimed at the type of data that can be interesting to gather in order to estimate the number of people in a public place. It is also about how sensitive data can be anonymized when gathered. To do this, Bluetooth devices was chosen for investigating how the MAC addresses would work to estimate the number of people. For collecting MAC addresses a proof of concept system was developed, where an Android application was used to collect MAC addresses. These MAC addresses were anonymized before being stored in a database. The application anonymize the unique MAC address according to three levels of security. Field studies were conducted as the number of people were counted visually then anonymous collection of MAC addresses were made. The conclusion was that Bluetooth will be difficult to use for estimating the number of people because not everyone has Bluetooth on. The application developed demonstrates that data can be collected safely and thus does not violate privacy.
207

Ultra-low power energy harvesting wireless sensor network design

Zheng, Chenyu January 1900 (has links)
Master of Science / Department of Electrical and Computer Engineering / William B. Kuhn and Balasubramaniam Natarajan / This thesis presents an energy harvesting wireless sensor network (EHWSN) architecture customized for use within a space suit. The contribution of this research spans both physical (PHY) layer energy harvesting transceiver design and appropriate medium access control (MAC) layer solutions. The EHWSN architecture consists of a star topology with two types of transceiver nodes: a powered Gateway Radio (GR) node and multiple energy harvesting (EH) Bio-Sensor Radio (BSR) nodes. A GR node works as a central controller to receive data from BSR nodes and manages the EHWSN via command packets; low power BSR nodes work to obtain biological signals, packetize the data and transmit it to the GR node. To demonstrate the feasibility of an EHWSN at the PHY layer, a representative BSR node is designed and implemented. The BSR node is powered by a thermal energy harvesting system (TEHS) which exploits the difference between the temperatures of a space suit's cooling garment and the astronaut's body. It is shown that through appropriate control of the duty-cycle in transmission and receiving modes, it is possible for the transceiver to operate with less than 1mW power generated by the TEHS. A super capacitor, energy storage of TEHS, acts as an energy buffer between TEHS and power consuming units (processing units and transceiver radio). The super capacitor charges when a BSR node is in sleep mode and discharges when the node is active. The node switches from sleep mode to active mode whenever the super capacitor is fully charged. A voltage level monitor detects the system's energy level by measuring voltage across the super capacitor. Since the power generated by the TEHS is extremely low(less than 1mW) and a BSR node consumes relatively high power (approximately 250mW) during active mode, a BSR node must work under an extremely low duty cycle (approximately 0.4%). This ultra-low duty cycle complicates MAC layer design because a BSR node must sleep for more than 99.6% of overall operation time. Another challenge for MAC layer design is the inability to predict when the BSR node awakens from sleep mode due to unpredictability of the harvested energy. Therefore, two feasible MAC layer designs, CSA (carrier sense ALOHA based)-MAC and GRI (gateway radio initialized)-MAC, are proposed in this thesis.
208

Évolution des propriétés dynamiques de poutres en béton armé endommagées en laboratoire

Saidou Sanda, Mamar January 2015 (has links)
Le présent document constitue une partie d'un projet de recherche global sur la quantification de l'endommagement minimal détectable par des mesures de vibrations ambiantes mesurées sur un pont routier en service. L'objectif de l'étude effectuée dans cette maîtrise est de suivre l'évolution des propriétés dynamiques de poutres en béton armé en fonction de différents niveaux d'endommagement qui leur sont infligés en laboratoire, et de vérifier si ces propriétés sont des indicateurs fiables de l'endommagement. Elles serviront par la suite à effectuer une détection d'endommagement avec le logiciel commercial FEMtools et avec un algorithme développé en langage Matlab. Une étude expérimentale qui a porté sur trois spécimens de poutre en béton armé simple fabriqués et testés à l'Université de Sherbrooke est présentée. Toutes les poutres ont été dimensionnées adéquatement en flexion et présentent des défauts de renforcement en cisaillement. Deux spécimens ne renferment que l'armature minimale de cisaillement, et la dernière ne renferme aucune armature de cisaillement, comme c'est le cas pour des ponts-dalle. Les types d'endommagement testés sont ceux qui sont le plus souvent retrouvés sur les ponts routiers au Québec: l'endommagement dû au travail des poutres en flexion-cisaillement, l'endommagement dû à la corrosion des armatures de flexion et l'altération des conditions d'appui. Des essais de flexion quatre points ont été effectués pour simuler les dommages en flexion-cisaillement. Les modifications des conditions d'appuis sont simulées en bloquant les degrés de liberté d'un des appuis. La corrosion des armatures de flexion est simulée en sectionnant de manière séquentielle ces armatures en trois positions le long de la poutre. L'extraction des propriétés modales des poutres a été effectuée après tout nouvel endommagement imposé à l'aide d'excitations au marteau d'impact et d'une série d'accéléromètres. Deux méthodes d'analyse modales ont été utilisées: FRF (fonctions de réponse en fréquence) et FDD (Frequency Domain Decomposition). Les évolutions des propriétés modales à travers les endommagements des trois poutres montrent que les fréquences naturelles et les déformées modales sont des indicateurs très clairs de l'altération des conditions d'appui et de la fissuration en flexion-cisaillement. L'évolution de ces indicateurs est néanmoins plus subtile dans le cas d'une poutre sans renforcement en cisaillement, dont la rupture est très précoce. Les résultats montrent, en revanche, que la corrosion des armatures est un dommage beaucoup plus difficile à saisir à travers l'évolution des propriétés modales. L'ensemble des analyses expérimentales montre aussi que les taux d'amortissement modaux ne constituent pas des indicateurs fiables des endommagements testés sur les poutres.
209

Étude sur les perspectives des omnipraticiens du Québec quant à leur rôle-conseil concernant l'utilisation des médecines alternatives et complémentaires (MAC)

O'Connor, Daniel January 2008 (has links)
Les médecines alternatives et complémentaires (MAC) sont de plus en plus populaires en Occident et au Canada. Certaines MAC reposent sur des données probantes, mais bien des MAC se prêtent mal aux exigences de la démarche scientifique et demeurent des traitements non reconnus, parfois même néfastes ou pratiquées par des charlatans. Or, les usagers ont recours à ces formes de traitement sans nécessairement posséder les connaissances requises pour faire un choix éclairé et sécuritaire. Il faudrait donc, pour contribuer à assurer leur sécurité, voir à ce qu'ils soient suffisamment informés pour faire un choix éclairé.Les omnipraticiens, en raison de leur formation et importance dans la prestation des soins de santé, semblent bien placés pour remplir ce rôle (prévu par leurs obligations déontologiques) et aider les usagers à choisir judicieusement leurs traitements. Cependant, plusieurs auteurs ont relevé l'embarras des médecins à discuter des MAC avec leurs patients ou à les conseiller à ce sujet, ainsi que les besoins des médecins en matière de formation sur les MAC. Cela nous a amené à nous demander si les omnipraticiens se sentent en mesure de conseiller leurs patients sur l'utilisation des MAC. Pour atteindre notre objectif, nous avons effectué une recherche exploratoire descriptive avec méthodologie quantitative (enquête). Nous avons fait parvenir un questionnaire d'auto-perception à un échantillon aléatoire représentatif de 1000 omnipraticiens, constitué à partir d'une liste générée par un programme en lien avec la base de données du Collège des médecins du Québec et fournie par le Centre de formation continue de la Faculté de médecine et des sciences de la santé de l'Université de Sherbrooke, avec l'autorisation de son directeur. Nous avons fait trois envois : le questionnaire avec texte d'introduction à l'étude, une carte de rappel deux semaines plus tard et de nouveau le questionnaire deux semaines après l'envoi de la carte de rappel. Le texte d'introduction à l'étude précisait que la participation était anonyme et que le fait de compléter le questionnaire serait interprété comme un consentement à l'étude.Les analyses statistiques ont été faites à l'aide du logiciel SPSS, version 17.0. Nous avons obtenu un taux de réponse de 19,5 %. Nous avons constaté que 47,3 % des omnipraticiens interrogés considéraient qu'ils n'étaient généralement pas en mesure de conseiller leurs patients sur l'utilisation des MAC et que 50,3 % des répondants ne se sentaient pas à l'aise de répondre aux questions de leurs patients sur une MAC spécifique. De plus, moins du quart des omnipraticiens sondés (23,6 %) ont confirmé savoir où trouver des données probantes sur l'efficacité ou l'innocuité de MAC spécifiques. L'embarras que semblaient éprouver les répondants quant à leur rôle-conseil concernant l'utilisation des MAC et leur connaissance limitée des sources de données probantes pour ces approches font clairement ressortir d'importants besoins en matière de formation. C'est pourquoi nous croyons qu'une intensification des efforts de formation relatifs aux obligations déontologiques des médecins (pour les aider à définir leur rôle-conseil concernant l'utilisation des MAC) et aux sources de données probantes sur les MAC (pour appuyer leur jugement clinique) pourrait aider les omnipraticiens du Québec à se sentir plus à l'aise dans leur rôle auprès des patients qui envisagent ou choisissent d'utiliser une MAC, afin, espérons-nous, de favoriser la communication avec ces patients à ce sujet et contribuer à assurer leur sécurité en réduisant le risque d'effets secondaires et d'interactions nocives.
210

Mobility and Multi-channel Communications in Low-power Wireless Networks

Gonga, António January 2015 (has links)
The prospect of replacing existing fixed networks with cheap, flexible and evenmobile low-power wireless network has been a strong research driver in recent years.However, many challenges still exist: reliability is hampered by unstable and burstycommunication links; the wireless medium is getting congested by an increasingnumber of wireless devices; and life-times are limited due to difficulties in developingefficient duty-cycling mechanisms. These challenges inhibit the industry to fullyembrace and exploit the capabilities and business opportunities that low-powerwireless devices offer. In this thesis, we propose, design, implement, and evaluateprotocols and systems to increase flexibility and improve efficiency of low-powerwireless communications. First, we present MobiSense, a system architecture for energy-efficient communicationsin micro-mobility sensing scenarios. MobiSense is a hybrid architecturecombining a fixed infrastructure network and mobile sensor nodes. Simulations andexperimental results show that the system provides high throughput and reliabilitywith low-latency handoffs. Secondly, we investigate if and how multi-channel communication can mitigate theimpact of link dynamics on low-power wireless protocols. Our study is motivated bya curiosity to reconcile two opposing views: that link dynamics is best compensatedby either (i) adaptive routing, or (ii) multi-channel communication. We perform acomprehensive measurement campaign and evaluate performance both in the singlelink and over a multi-hop network. We study packet reception ratios, maximumburst losses, temporal correlation of losses and loss correlations across channels.The evaluation shows that multi-channel communication significantly reduces linkburstiness and packet losses. In multi-hop networks, multi-channel communicationsand adaptive routing achieves similar end-to-end reliability in dense topologies,while multi-channel communication outperforms adaptive routing in sparse networkswhere re-routing options are limited. Third, we address the problem of distributed information exchange in proximitybasednetworks. First, we consider randomized information exchange and assess thepotential of multi-channel epidemic discovery. We propose an epidemic neightbordiscoverymechanism that reduces discovery times considerably compared to singlechannelprotocols in large and dense networks. Then, the idea is extended todeterministic information exchange. We propose, design and evaluate an epidemicinformation dissemination mechanism with strong performance both in theory andpractice. Finally, we apply some of the concepts from epidemic discovery to the designof an asynchronous, sender-initiated multi-channel medium access protocol. Theprotocol combines a novel mechanism for rapid schedule learning that avoids perpacketchannel negotiations with the use of burst data transfer to provide efficientsupport of ’multiple contending unicast and parallel data flows. / De senaste åren har forskning inom trådlös kommunikation drivits av önskemåletom att kunna ersätta nuvarande trådbundna kommunikationslänkar med trådlösa lågenergialternativ.Dock kvarstår många utmaningar, såsom instabila och sporadiskalänkar, överbelastning på grund av en ökning i antal trådlösa enheter, hur maneffektivt kan växla duty-cycling mekanismen för att förlänga nätverkens livstid,med flera. Dessa utmaningar begränsar industrin från att ta till sig och utnyttjade fördelar som trådlösa lågenergialternativ kan medföra. I den här avhandlingenföreslår, designar, implementerar och utvärderar vi protokoll och system som kanförbättra de nuvarande trådlösa lågenergialternativen. Först presenterar vi MobiSense, en systemarkitektur för energibesparande kommunikationi mikro-mobila sensorscenarier. MobiSense är en hybridarkitektur somkombinerar ett fast infrastrukturnätverk med rörliga sensornoder. Simulerings- ochexperimentella resultat visar att systemet uppnår en högre överföringskapacitet ochtillförlitlighet samtidigt som överlämnandet mellan basstationer har låg latens. I den andra delen behandlar vi hur effekterna från länkdynamiken hos protokollför lågenergikommunikation kan minskas, och försöker förena idéerna hos två motståendesynsätt: (i) flerkanalskommunikation och (ii) adaptiv routing. Vi analyserarenkanals- och flerkanalskommunikation över en-stegslänkar i termer av andelenmottagna paket kontra andelen förlorade, den maximala sporadiska förlusten avpaket, tidskorrelation för förluster och förlustkorrelation mellan olika kanaler. Resultatenindikerar att flerkanalskommunikation med kanalhoppning kraftigt minskardet sporadiska uppträdandet hos länkarna och korrelationen mellan paketförluster.För flerstegsnätverk uppvisar flerkanalskommunikation och adaptiv routingliknande tillförlitlighet i täta topologier, medan flerkanalskommunikation har bättreprestanda än adaptiv routing i glesa nätverk med sporadiska länkar. I den tredje delen studeras distribuerat informationsutbyte i närhetsbaseradenätverk. Först betraktas det slumpmässiga fallet och vi fastställer potentialen hosflerkanalig indirekt utforskning av nätverket. Vi analyserar ett trestegs protokoll,som möjliggör en snabbare utforskning av nätverket. Sedan föreslår vi en ny algoritmför att upptäcka grannarna i ett flerkanalsnätverk, som kraftigt minskarutforskningstiden i jämförelse med ett enkanalsprotokoll. Vi utökar även problemettill det deterministiska fallet och föreslår en mekanism för informationsspridningsom påskyndar utforskningstiderna för deterministiska protokoll. Utvidgningen hartvå huvudförbättringar som leder till kraftigt ökad prestanda samtidigt som degaranterar att utforskningsprocessen är deterministisk. Till sist applicerar vi koncepten rörande indirekt utforskning för att designa,implementera och evaluera ett asynkront sändare-initierat flerkanals MAC protokollför trådlös lågenergikommunikation. Protokollet kombinerar en ny mekanism försnabbt lärande av tidsschemat, vilket undviker kanalförhandling för varje paket,med sporadisk dataöverföring. Detta möjliggör ett effektivt tillhandahållande avflera konkurrerande och parallella dataflöden. / <p>QC 20151204</p>

Page generated in 0.0519 seconds