• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 50
  • 32
  • 6
  • 4
  • 1
  • 1
  • Tagged with
  • 102
  • 44
  • 35
  • 30
  • 19
  • 16
  • 16
  • 16
  • 14
  • 14
  • 13
  • 12
  • 12
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Auction-based dynamic resource orchestration in cloud-based radio access networks / Mécanismes d'enchères pour l'orchestration dynamique des ressources dans le cloud-RAN

Morcos, Mira 23 January 2019 (has links)
La densification de réseau à l'aide de petites cellules massivement déployées sur les zones macro-cellules, représente une solution prometteuse pour les réseaux mobiles 5G avenir pour faire face à l'augmentation du trafic mobile. Afin de simplifier la gestion de l'hétérogène du réseau d'accès radio (Radio Access Network RAN) qui résulte du déploiement massif de petites cellules, des recherches récentes et des études industrielles ont favorisé la conception de nouvelles architectures de RAN centralisés appelés comme Cloud-RAN (C-RAN), ou RAN virtuel (V-RAN), en incorporant les avantages du cloud computing et Network Functions Virtualization (NFV). Le projet de DynaRoC vise l'élaboration d'un cadre théorique de l'orchestration de ressources pour les C-RAN et dériver les limites de performance fondamentaux ainsi que les arbitrages entre les différents paramètres du système, et la conception de mécanismes d'orchestration de ressources dynamiques sur la base des conclusions théoriques à atteindre un équilibre de performance souhaité, en tenant compte des différents défis de conception. Le doctorant va étudier les mécanismes d'optimisation des ressources novatrices pour favoriser le déploiement de C-RAN, améliorer leur performance exploitant la technologie Network Functions Virtualization / Network densification using small cells massively deployed over the macro-cell areas, represents a promising solution for future 5G mobile networks to cope with mobile traffic increase. In order to simplify the management of the heterogeneous Radio Access Network (RAN) that results from the massive deployment of small cells, recent research and industrial studies have promoted the design of novel centralized RAN architectures termed as Cloud-RAN (C-RAN), or Virtual RAN (V-RAN), by incorporating the benefits of cloud computing and Network Functions Virtualization (NFV). The DynaRoC project aims at (1) developing a theoretical framework of resource orchestration for C-RAN and deriving the fundamental performance limits as well as the tradeoffs among various system parameters, and (2) designing dynamic resource orchestration mechanisms based on the theoretical findings to achieve a desired performance balance, by taking into account various design challenges. The PhD student will investigate innovative resource optimization mechanisms to foster the deployment of C-RANs, improving their performance exploiting the enabling Network Functions Virtualization technology
92

Virtualisation de la mesure d’exposition du public général au champ magnétique basse fréquence dans le domaine de l’automobile / Virtualization of measurement of the general public exposure to low frequency magnetic field in automotive domain

Magued, Michael 13 March 2018 (has links)
L’exposition des personnes aux champs électromagnétiques est une problématique majeure de société qui touche le domaine de l’automobile. Le développement de la technologie des véhicules électriques et hybrides nécessite la prise en compte de la problématique d’exposition aux ondes dès la phase même de la conception.Le travail présenté dans ce document s’intéresse principalement à l’exposition aux champs magnétiques basse fréquence (BF) marqués par les effets non thermiques de stimulation électriques. Dans cette gamme fréquentielle, les sources principales des risques d’exposition sont les modules de la chaîne de traction qui sont souvent situés à proximité des passagers. L’objectif principal de cette thèse est de virtualiser la mesure évaluant l’exposition aux champs magnétiques BF, jusqu’ici réalisée par un testeur de niveau d’exposition commercial, afin d’être capable de faire une levée de risque d’exposition, en amont, sans entraîner de surcoût au constructeur. Ceci est réalisé en virtualisant l’instrument de mesure.Nous consacrons d’abord notre étude à la compréhension de la mesure d’évaluation d’exposition et du fonctionnement du champmètre Narda ELT-400 utilisé chez notre constructeur automobile pour mesurer l’indice d’exposition. Ainsi, nous détaillons les différentes définitions et méthodes de calcul de l’indice d’exposition du public général aux champs magnétiques BF. Enfin, nous présentons des applications de l’utilisation du champmètre sur des cas de mesure en statique et en dynamique.La deuxième partie de l’étude traite de la construction du prototype virtuel permettant de modéliser la mesure d’indice d’exposition aux champs magnétiques BF réalisée par le champmètre Narda ELT-400. Pour ce faire, nous développons et optimisons dans un premier temps le modèle de la sonde triaxiale du champmètre sous FEKO permettant de positionner et d’orienter la sonde selon le choix de l’utilisateur. Ensuite le champ magnétique rayonné par la sonde virtuelle est traité pour obtenir une mesure virtuelle de l’induction magnétique détectée par la sonde et de l’indice d’exposition.La troisième partie est consacrée à la validation du modèle complet sur des cas réels de mesures effectuées sur des pinces manuelles de soudage par points en comparant les résultats du prototype virtuel à ceux mesurés. La validation du modèle est réalisée dans trois cas d’étude différents correspondant à des profils de champ différents, des fréquences différentes dans la gamme BF et à des formes de signal différentes.Dans la dernière partie de notre étude, une approche stochastique de simulation est proposée en appliquant la méthode de Monte-Carlo, basée sur un grand nombre de tirages aléatoires. Cette méthode permet d’étudier la dispersion des résultats due à l’imprécision plausible de positionnement et d’orientation commise par l’opérateur de la sonde. Cette méthode est appliquée à différentes distances de sources rayonnantes élémentaires. Les résultats principaux de cette partie portent sur le lien entre l’homogénéité du champ au point investigué et la variabilité de la mesure virtuelle autour de ce point suite à l’imprécision commise. / Exposure to electromagnetic fields is a major issue in society that affects the automotive domain. The development of electric and hybrid vehicles technology requires the consideration of the issue of exposure since the conception stage.The work presented in this paper is mainly concerned with exposure to low-frequency (LF) magnetic fields distinguished with non-thermal electric stimulation effects. In this frequency range, the main sources of exposure risks are the powertrain elements often located close to the passengers.The main objective of this thesis is to virtualize the measurement assessing exposure to LF magnetic fields, hitherto performed by a commercial exposure level tester, to be able to minimize exposure risks, a priori, without incurring additional costs to the manufacturer. This is realized by virtualizing the measuring instrument.We focus first on understanding the exposure evaluation measurement and on the operation of the ELT-400 Narda field meter used at our automobile manufacturer to measure the exposure index. Thus, we show the different definitions and methods of calculating exposure index of the general public to LF magnetic fields. Finally, we present applications of the use of the field meter on measuring cases in statistic and dynamic states.The second part of the study is consecrated to the construction of the virtual prototype to model the measurement of the exposure index to LF magnetic fields performed by Narda field meter ELT-400. To do this, first we develop and optimize the model of the field meter’s triaxial probe in FEKO to position and orient the probe as selected by the user. Then the magnetic field radiated by the virtual probe is processed to obtain a virtual measurement of the magnetic induction detected by the probe and of the exposure index.The third part of the study deals with the validation of the whole model on real cases of measurements done over manual spot welding clamps by comparing the virtual prototype results with those measured. The model validation is performed in three different case studies corresponding to different field profiles, different frequencies in LF domain and different forms of signal.In the last part of our study, a stochastic simulation approach is proposed by applying the Monte-Carlo Method based on a large number of random draws. This method allows studying the dispersion of results due to the plausible imprecise positioning and orientation committed by the operator of the probe. This method is applied at different distances from elementary radiating sources. The main results of this part focus on the link between the field homogeneity at the investigated point and the variability of the virtual measurement around this point due to the inaccuracy committed.
93

Energy Efficient Cloud Computing Based Radio Access Networks in 5G. Design and evaluation of an energy aware 5G cloud radio access networks framework using base station sleeping, cloud computing based workload consolidation and mobile edge computing

Sigwele, Tshiamo January 2017 (has links)
Fifth Generation (5G) cellular networks will experience a thousand-fold increase in data traffic with over 100 billion connected devices by 2020. In order to support this skyrocketing traffic demand, smaller base stations (BSs) are deployed to increase capacity. However, more BSs increase energy consumption which contributes to operational expenditure (OPEX) and CO2 emissions. Also, an introduction of a plethora of 5G applications running in the mobile devices cause a significant amount of energy consumption in the mobile devices. This thesis presents a novel framework for energy efficiency in 5G cloud radio access networks (C-RAN) by leveraging cloud computing technology. Energy efficiency is achieved in three ways; (i) at the radio side of H-C-RAN (Heterogeneous C-RAN), a dynamic BS switching off algorithm is proposed to minimise energy consumption while maintaining Quality of Service (QoS), (ii) in the BS cloud, baseband workload consolidation schemes are proposed based on simulated annealing and genetic algorithms to minimise energy consumption in the cloud, where also advanced fuzzy based admission control with pre-emption is implemented to improve QoS and resource utilisation (iii) at the mobile device side, Mobile Edge Computing (MEC) is used where computer intensive tasks from the mobile device are executed in the MEC server in the cloud. The simulation results show that the proposed framework effectively reduced energy consumption by up to 48% within RAN and 57% in the mobile devices, and improved network energy efficiency by a factor of 10, network throughput by a factor of 2.7 and resource utilisation by 54% while maintaining QoS.
94

VM Allocation in Cloud Datacenters Based on the Multi-Agent System. An Investigation into the Design and Response Time Analysis of a Multi-Agent-based Virtual Machine (VM) Allocation/Placement Policy in Cloud Datacenters

Al-ou'n, Ashraf M.S. January 2017 (has links)
Recent years have witnessed a surge in demand for infrastructure and services to cover high demands on processing big chunks of data and applications resulting in a mega Cloud Datacenter. A datacenter is of high complexity with increasing difficulties to identify, allocate efficiently and fast an appropriate host for the requested virtual machine (VM). Establishing a good awareness of all datacenter’s resources enables the allocation “placement” policies to make the best decision in reducing the time that is needed to allocate and create the VM(s) at the appropriate host(s). However, current algorithms and policies of placement “allocation” do not focus efficiently on awareness of the resources of the datacenter, and moreover, they are based on conventional static techniques. Which are adversely impacting on the allocation progress of the policies. This thesis proposes a new Agent-based allocation/placement policy that employs some of the Multi-Agent system features to get a good awareness of Cloud Datacenter resources and also provide an efficient allocation decision for the requested VMs. Specifically, (a) The Multi-Agent concept is used as a part of the placement policy (b) A Contract Net Protocol is devised to establish good awareness and (c) A verification process is developed to fully dimensional VM specifications during allocation. These new results show a reduction in response time of VM allocation and the usage improvement of occupied resources. The proposed Agent-based policy was implemented using the CloudSim toolkit and consequently was compared, based on a series of typical numerical experiments, with the toolkit’s default policy. The comparative study was carried out in terms of the time duration of VM allocation and other aspects such as the number of available VM types and the amount of occupied resources. Moreover, a two-stage comparative study was introduced through this thesis. Firstly, the proposed policy is compared with four state of the art algorithms, namely the Random algorithm and three one-dimensional Bin-Packing algorithms. Secondly, the three Bin-Packing algorithms were enhanced to have a two-dimensional verification structure and were compared against the proposed new algorithm of the Agent-based policy. Following a rigorous comparative study, it was shown that, through the typical numerical experiments of all stages, the proposed new Agent-based policy had superior performance in terms of the allocation times. Finally, avenues arising from this thesis are included. / Al al-Bayt University in Jordan.
95

Energy efficient cloud computing based radio access networks in 5G: Design and evaluation of an energy aware 5G cloud radio access networks framework using base station sleeping, cloud computing based workload consolidation and mobile edge computing

Sigwele, Tshiamo January 2017 (has links)
Fifth Generation (5G) cellular networks will experience a thousand-fold increase in data traffic with over 100 billion connected devices by 2020. In order to support this skyrocketing traffic demand, smaller base stations (BSs) are deployed to increase capacity. However, more BSs increases energy consumption which contributes to operational expenditure (OPEX) and CO2 emissions. Also, an introduction of a plethora of 5G applications running in the mobile devices causes a significant amount of energy consumption in the mobile devices. This thesis presents a novel framework for energy efficiency in 5G cloud radio access networks (C-RAN) by leveraging cloud computing technology. Energy efficiency is achieved in three ways; (i) at the radio side of H-C-RAN (Heterogeneous C-RAN), a dynamic BS switching off algorithm is proposed to minimise energy consumption while maintaining Quality of Service (QoS), (ii) in the BS cloud, baseband workload consolidation schemes are proposed based on simulated annealing and genetic algorithms to minimise energy consumption in the cloud, where also advanced fuzzy based admission control with pre-emption is implemented to improve QoS and resource utilisation (iii) at the mobile device side, Mobile Edge Computing (MEC) is used where computer intensive tasks from the mobile device are executed in the MEC server in the cloud. The simulation results show that the proposed framework effectively reduced energy consumption by up to 48% within RAN and 57% in the mobile devices, and improved network energy efficiency by a factor of 10, network throughput by a factor of 2.7 and resource utilisation by 54% while maintaining QoS.
96

Vers une gestion coopérative des infrastructures virtualisées à large échelle : le cas de l'ordonnancement / Toward cooperative management of large-scale virtualized infrastructures : the case of scheduling

Quesnel, Flavien 20 February 2013 (has links)
Les besoins croissants en puissance de calcul sont généralement satisfaits en fédérant de plus en plus d’ordinateurs (ou noeuds) pour former des infrastructures distribuées. La tendance actuelle est d’utiliser la virtualisation système dans ces infrastructures, afin de découpler les logiciels des noeuds sous-jacents en les encapsulant dans des machines virtuelles. Pour gérer efficacement ces infrastructures virtualisées, de nouveaux gestionnaires logiciels ont été mis en place. Ces gestionnaires sont pour la plupart hautement centralisés (les tâches de gestion sont effectuées par un nombre restreint de nœuds dédiés). Cela limite leur capacité à passer à l’échelle, autrement dit à gérer de manière réactive des infrastructures de grande taille, qui sont de plus en plus courantes. Au cours de cette thèse, nous nous sommes intéressés aux façons d’améliorer cet aspect ; l’une d’entre elles consiste à décentraliser le traitement des tâches de gestion, lorsque cela s’avère judicieux. Notre réflexion s’est concentrée plus particulièrement sur l’ordonnancement dynamique des machines virtuelles, pour donner naissance à la proposition DVMS (Distributed Virtual Machine Scheduler). Nous avons mis en œuvre un prototype, que nous avons validé au travers de simulations (notamment via l’outil SimGrid), et d’expériences sur le banc de test Grid’5000. Nous avons pu constater que DVMS se montrait particulièrement réactif pour gérer des infrastructures virtualisées constituées de dizaines de milliers de machines virtuelles réparties sur des milliers de nœuds. Nous nous sommes ensuite penchés sur les perspectives d’extension et d’amélioration de DVMS. L’objectif est de disposer à terme d’un gestionnaire décentralisé complet, objectif qui devrait être atteint au travers de l’initiative Discovery qui fait suite à ces travaux. / The increasing need in computing power has been satisfied by federating more and more computers (called nodes) to build the so-called distributed infrastructures. Over the past few years, system virtualization has been introduced in these infrastructures (the software is decoupled from the hardware by packaging it in virtual machines), which has lead to the development of software managers in charge of operating these virtualized infrastructures. Most of these managers are highly centralized (management tasks are performed by a restricted set of dedicated nodes). As established, this restricts the scalability of managers, in other words their ability to be reactive to manage large-scale infrastructures, that are more and more common. During this Ph.D., we studied how to mitigate these concerns ; one solution is to decentralize the processing of management tasks, when appropriate. Our work focused in particular on the dynamic scheduling of virtual machines, resulting in the DVMS (Distributed Virtual Machine Scheduler) proposal. We implemented a prototype, that was validated by means of simulations (especially with the SimGrid tool) and with experiments on the Grid’5000 test bed. We observed that DVMS was very reactive to schedule tens of thousands of virtual machines distributed over thousands of nodes. We then took an interest in the perspectives to improve and extend DVMS. The final goal is to build a full decentralized manager. This goal should be reached by the Discovery initiative,that will leverage this work.
97

Security for Virtualized Distributed Systems : from Modelization to Deployment / Sécurité des Systèmes Distribués Virtualisés : De la Modélisation au Déploiement

Lefray, Arnaud 03 November 2015 (has links)
Cette thèse s'intéresse à la sécurité des environnements virtualisés distribués type “Clouds” ou informatique en nuage. Dans ces environnements, le client bénéficie de ressources ou services (de calcul, stockage, etc.) à la demande sans connaissance de l'infrastructure sous-jacente. Ces services sont proposés à bas coût en mutualisant les ressources proposées aux clients. Ainsi, ces derniers se retrouvent à partager une infrastructure commune. Cependant, cette concentration des activités en fait une cible privilégiée pour un attaquant, d'autant plus intéressante que les Clouds présentent de nouveaux vecteurs d'attaque entre les clients du Clouds de part le partage des ressources. Actuellement, les fournisseurs de solutions de Cloud proposent une sécurité par défaut ne correspondant pas nécessairement aux besoins de sécurité des clients. Cet aspect est donc bien souvent négligé et cette situation donne lieu à de nombreux exemples d'attaques (vol de données, usage malicieux, etc.). Dans cette thèse, nous proposons une approche où le client spécifie ses besoins de sécurité ainsi que son application virtualisée au sein d'un modèle. Nous proposons notamment une nouvelle logique dédiée à l'expression de propriétés sur la propagation de l'information dans un système.Puis, nous proposons un déploiement automatique de ce modèle sur une infrastructure de type Cloud basée sur la virtualisation grâce à nos nouveaux algorithmes prenant en compte les propriétés de sécurité. Ces dernières sont assurées via un placement prenant en compte les risques d'attaques entre ressources partagées et/ou via la configuration de mécanismes de sécurité existants au sein du système. / This Thesis deals with security for virtualized distributed environments such as Clouds. In these environments, a client can access resources or services (compute, storage, etc.) on-demand without prior knowledge of the infrastructure underneath. These services are low-cost due to the mutualization of resources. As a result, the clients share a common infrastructure. However, the concentration of businesses and critical data makes Clouds more attractive for malicious users, especially when considering new attack vectors between tenants.Nowadays, Cloud providers offer default security or security by design which does not fit tenants' custom needs. This gap allows for multiple attacks (data thieft, malicious usage, etc.)In this Thesis, we propose a user-centric approach where a tenant models both its security needs as high-level properties and its virtualized application. These security objectives are based on a new logic dedicated to expressing system-based information flow properties. Then, we propose security-aware algorithm to automatically deploy the application and enforce the security properties. The enforcement can be realized by taking into account shared resources during placement decision and/or through the configuration of existing security mechanisms.
98

Security in cloud computing / La sécurité dans le Cloud

Lounis, Ahmed 03 July 2014 (has links)
Le Cloud Computing, ou informatique en nuages, est un environnement de stockage et d’exécution flexible et dynamique qui offre à ses utilisateurs des ressources informatiques à la demande via internet. Le Cloud Computing se développe de manière exponentielle car il offre de nombreux avantages rendus possibles grâce aux évolutions majeures des Data Centers et de la virtualisation. Cependant, la sécurité est un frein majeur à l’adoption du Cloud car les données et les traitements seront externalisés hors de site de confiance de client. Cette thèse contribue à résoudre les défis et les issues de la sécurité des données dans le Cloud pour les applications critiques. En particulier, nous nous intéressons à l’utilisation de stockage pour les applications médicales telles que les dossiers de santé électroniques et les réseaux de capteurs pour la santé. D’abord, nous étudions les avantages et les défis de l’utilisation du Cloud pour les applications médicales. Ensuite, nous présentons l’état de l’art sur la sécurité dans le Cloud et les travaux existants dans ce domaine. Puis nous proposons une architecture sécurisée basée sur le Cloud pour la supervision des patients. Dans cette solution, nous avons développé un contrôle d’accès à granularité fine pour résoudre les défis de la sécurité des données dans le Cloud. Enfin, nous proposons une solution de gestion des accès en urgence. / Cloud computing has recently emerged as a new paradigm where resources of the computing infrastructures are provided as services over the Internet. However, this paradigm also brings many new challenges for data security and access control when business or organizations data is outsourced in the cloud, they are not within the same trusted domain as their traditional infrastructures. This thesis contributes to overcome the data security challenges and issues due to using the cloud for critical applications. Specially, we consider using cloud storage services for medical applications such as Electronic Health Record (EHR) systems and medical Wireless Sensor Networks. First, we discuss the benefits and challenges of using cloud services for healthcare applications. Then, we study security risks of the cloud, and give an overview on existing works. After that, we propose a secure and scalable cloud-based architecture for medical applications. In our solution, we develop a fine-grained access control in order to tackle the challenge of sensitive data security, complex and dynamic access policies. Finally, we propose a secure architecture for emergency management to meet the challenge of emergency access.
99

Analýza a návrh změn informačního systému firmy / Analysis and Design of Information System

Lebeda, Martin January 2011 (has links)
This work deals with the modifications of project MeDiMed, which ceased to meet the requirements it imposed. In the first part the main objectives, targets and methods to achieve them are defined. The second part deals with the theory that is needed to understand the issue. In the practical part, which is based on the theory is prepared SWOT analysis and the modified HOS-8 analysis of the current state, whose results are then analyzed. The next section presents design of new solution. The conclusion summarizes all the proposed solutions and knowledge that have been achieved in this work.
100

Analýza a návrh změn informačního systému MEDIMED / Analysis and Design of Information System MEDIMED

Lebeda, Martin January 2012 (has links)
This work deals with the modifications of project MeDiMed, which ceased to meet the requirements it imposed. In the first part the main objectives, targets and methods to achieve them are defined. The second part deals with the theory that is needed to understand the issue. In the practical part, which is based on the theory is prepared SWOT analysis and the modified HOS-8 analysis of the current state, whose results are then analyzed. The next section presents design of new solution. The conclusion summarizes all the proposed solutions and knowledge that have been achieved in this work.

Page generated in 0.1152 seconds