Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Profilage et analyse comportementale“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Profilage et analyse comportementale" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Profilage et analyse comportementale"
Murdocca, Carmela. „The Racial Profile: Governing Race through Knowledge Production (Research Note)“. Canadian journal of law and society 19, Nr. 2 (August 2004): 153–67. http://dx.doi.org/10.1017/s0829320100008176.
Der volle Inhalt der QuelleNault, Geneviève, Émilie Couture-Glassco und Katharine Larose-Hébert. „Le mal caché de la rue : le poids de l’étiquette“. Reflets 22, Nr. 1 (28.07.2016): 56–82. http://dx.doi.org/10.7202/1037163ar.
Der volle Inhalt der QuelleKauppi, Carol, Henri Pallard und Vivan Ellery. „Interactions des personnes sans abri avec les services de police : profilage social et droits“. Reflets 22, Nr. 1 (28.07.2016): 83–122. http://dx.doi.org/10.7202/1037164ar.
Der volle Inhalt der QuelleSidi Ali Cherif, Nawel, und Emmanuelle Garbe. „La carrière entre perspectives cognitive et comportementale : une étude des scripts de carrière des magistrats au sein de l’institution judiciaire“. @GRH N° 48, Nr. 3 (18.08.2023): 133–61. http://dx.doi.org/10.3917/grh.048.0133.
Der volle Inhalt der QuelleEmery, Yves, und Armand Brice Kouadio. „Marque employeur et stratégies RH pour les employeurs publics. Le cas du bassin d’emploi Franco-Valdo-Genevois“. Les nouvelles frontières du management public 21, Nr. 2 (16.10.2018): 47–59. http://dx.doi.org/10.7202/1052686ar.
Der volle Inhalt der QuelleChaignon, Pierre, und Elen Vuidard. „L’analyse comportementale et l’enquêteur : un partenariat de confiance“. Revue française de criminologie et de droit pénal N° 2, Nr. 1 (01.04.2014): 65–81. http://dx.doi.org/10.3917/rfcdp.002.0065.
Der volle Inhalt der QuelleAuclair, Vickie, Philippe-Olivier Harvey und Martin Lepage. „La thérapie cognitive-comportementale dans le traitement du TDAH chez l’adulte“. Mosaïque 41, Nr. 1 (05.07.2016): 291–311. http://dx.doi.org/10.7202/1036976ar.
Der volle Inhalt der QuelleQuintana, Carmen. „Une interprétation comportementale de la marche automatique chez le nourrisson“. ACTA COMPORTAMENTALIA 15, Nr. 2 (01.12.2007): 191–206. http://dx.doi.org/10.32870/ac.v15i2.14520.
Der volle Inhalt der QuelleBOITOUT, Nicolas, Fabrice HERVÉ und Mohamed ZOUAOUI. „Médias et sentiment sur les marchés actions européens : influence de la culture nationale“. Management international 20, Nr. 2 (25.05.2018): 134–56. http://dx.doi.org/10.7202/1046568ar.
Der volle Inhalt der QuelleSylvestre, Marie-Eve, Céline Bellot, Philippe Antoine Couture Ménard und Alexandra Caroline Tremblay. „Le droit est aussi une question de visibilité: l'occupation des espaces publics et les parcours judiciaires des personnes itinérantes à Montréal et à Ottawa“. Canadian journal of law and society 26, Nr. 3 (Dezember 2011): 531–61. http://dx.doi.org/10.3138/cjls.26.3.531.
Der volle Inhalt der QuelleDissertationen zum Thema "Profilage et analyse comportementale"
Esposito, Fiammetta. „Tueurs en série français : regards croisés de la psychopathologie et de la criminologie à propos de six meurtriers multiréitérants français“. Poitiers, 2007. http://www.theses.fr/2007POIT3006.
Der volle Inhalt der QuelleA serial killer never acts without motive : his murderous acts are triggered by a specific drive. The motivations of a serial killer are deeply hidden in his pathological psyche. Each of his gestures and each word he will pronounce about the homicides he committed can be decoded particulary thanks to criminology and psychopathology. Upstream, we shall look into the biography of these atypical criminals ; downstream, we shall raise the question of their future in detention and their access to medical attention, with regard to the danger they represent. The first part of this study lays the foundations of the criminal and behavioral analysis, which basis will help study the profile of six French criminals in the second part. The third part consists of a more methodological approach for the use of the practitioners : judicial police officers, magistrates, lawyers ans psychiatrists
Toure, Almamy. „Collection, analysis and harnessing of communication flows for cyber-attack detection“. Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Der volle Inhalt der QuelleThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Pi, Lei. „Langage de description d'architecture : sémantique et analyse comportementale“. Toulouse, ISAE, 2010. http://www.theses.fr/2010ESAE0008.
Der volle Inhalt der QuelleThe evolution of the complexity of critical embedded systems currently leads to use on the one hand modeling languages closest to the specifications of the designer’s job, and on the other hand verification tools (model checker) to ensure the correction of the system with respect to the correctness requirements and the real-time constraints. It is in this context that the project TOPCASED has been launched to propose a framework to develop critical real-time systems based on formal verification and dedicated languages. The methods and tools from this work are an integration of formal verification in the process and platform development. AADL (the SAE Architecture Analysis and Design Language) est un langage de description d’architecture qui permet de décrire autant les aspects matériels que les composants logiciels d’un système. In order to make easer the connection of model checkers to those languages, the pivot FIACRE language (Format Intermédiaire pour les Architectures de Composants Répartis Embarqués) has been developed. It is powerful enough to support the expression of the semantics of real time. In this context, I studied the semantic of the AADL execution model and its expression in different formalisms, like TASM, BIP, ACSR and FIACRE. They revealed the need to unify these formalisms. I worked on a new definition of the semantics of the language FIACRE. Then I propose to enrich FIACRE by a suspend/resume operator and a mechanism for resource allocation of which usefullness is illustrated on several examples. However, the induced expressive power no longer permits the use of TPN for the verification of extended FIACRE models. Thus, I propose a translation of the extended FIACRE language into a class of TPN newly introduced in the environment Tina: Petri nets with stopwatches
Michel, Grégory. „Recherche de sensations et de nouveaute a l'adolescence : trait developpemental, etat ou facteur de vulnerabilite aux conduites de consommation et a risques“. Paris 7, 1999. http://www.theses.fr/1999PA070061.
Der volle Inhalt der QuelleVersini, Audrey. „Analyse génétique et phénotypique d'une addiction comportementale : l'anorexie mentale“. Paris 6, 2010. http://www.theses.fr/2010PA066344.
Der volle Inhalt der QuelleDesrumaux-Zagrodnicki, Pascale. „Explications causales et engagement contre ou pro attitudinal : de l'internalité aux conduites pro-attitudinales“. Lille 3, 1996. http://www.theses.fr/1996LIL30024.
Der volle Inhalt der QuelleThe thesis examines the conditions under which certain cognitions, relating to a person's feeling of control and responsability, influence behaviour. It brings together two theoretical fields of cognitive social psychology, causal explanations of reinforcement (locus of control) and of behaviours (attribution), on the one hand, and the theories on behaviour patterns and behaviour rationalization (commitment and cognitive dissonance), on the other. The hypothesis mat the processes of internal and external explanations influence behaviour and subsequent attitude change is interpreted in a new light, distinguishing between behaviours and contrasting attitudes : the experimental part begins by experimenting with and comparing different methods for activating causal explanatory processes. It then proceeds to experiment with the effect of causal explanatory processes, wether activated or not, on pro and counterattitudinal commitment. Counter-attitudinal requests (re. Trade-unionism) trigger a heteronomous process which gives rise to independence between causal processes and behaviours arising from forced submission. Pro-attitudinal requests (for blood-giving and homework aid) generate an autonomous process predisposing to commitment and attitude change in internals compared with externals. The intervention of causal explanatory models is cost-related : the more costly the pro-attitudinal request is, the more the internals differ from the externals in commitment and subsequent attitude change
Gruber, Fabian. „Débogage de performance pour code binaire : Analyse de sensitivité et profilage de dépendances“. Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM071.
Der volle Inhalt der QuelleDebugging, as usually understood, revolves around finding and removing defects in software that prevent it from functioning correctly.That is, when one talks about bugs and debugging one usually means functional bugs and functional debugging.In the context of this thesis, however, we will talk about performance bugs and performance debugging.Meaning we want to find defects that do not cause a program to crash or behave wrongly, but that make it run inefficiently, too slow, or use too many resources.To that end, we have developed tools that analyse and model the performance to help programmers improve their code to get better performance.We propose the following two performance debugging techniques: sensitivity based performance bottleneck analysis and data-dependence profiling driven optimization feedback.Sensitivity Based Performance Bottleneck Analysis:Answering a seemingly trivial question about a program's performance, such as whether it is memory-bound or CPU-bound, can be surprisingly difficult.This is because the CPU and memory are not merely two completely independent resources, but are composed of multiple complex interdependent subsystems.Here a stall of one resource can both mask or aggravate problems with another resource.We present a sensitivity based performance bottleneck analysis that uses high-level performance model implemented in GUS, a fast CPU simulator to pinpoint performance bottlenecks.Our performance model needs a baseline for the expected performance of different operations on a CPU, like the peak IPC and how different instructions compete for processor resources.Unfortunately, this information is seldom published by hardware vendors, such as Intel or AMD.To build our processor model, we have developed a system to reverse-engineer the required information using automatically generated micro-benchmarks.Data-Dependence Driven Polyhedral Optimization Feedback:We have developed MICKEY, a dynamic data-dependence profiler that provides high-level optimization feedback on the applicability and profitability of optimizations missed by the compiler.MICKEY leverages the polyhedral model, a powerful optimization framework for finding sequences of loop transformations to expose data locality and implement both coarse, i.e. thread, and fine-grain, i.e. vector-level, parallelism.Our tool uses dynamic binary instrumentation allowing it to analyze program written in different programming languages or using third-party libraries for which no source code is available.Internally MICKEY uses a polyhedral intermediate representation IR that encodes both the dynamic execution of a program's instructions as well as its data dependencies.The IR not only captures data dependencies across multiple loops but also across, possibly recursive, procedure calls.We have developed an efficient trace compression algorithm, called the folding algorithm, that constructs this polyhedral IR from a program's execution.The folding algorithm also finds strides in memory accesses to predict the possibility and profitability of vectorization.It can scale to real-life applications thanks to a safe, selective over-approximation mechanism for partially irregular data dependencies and iteration spaces
Meary, David. „Perception visuelle des mouvements humains : analyse comportementale, neuroimagerie et neuropathologie“. Grenoble 2, 2003. http://www.theses.fr/2003GRE29019.
Der volle Inhalt der QuelleZatla, Hicham. „Modélisation et analyse comportementale du système Pilote-fauteuil roulant électrique“. Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0251/document.
Der volle Inhalt der QuelleThe Powered wheelchairs (PW) allowed many people with motor disabilities to find a suitable mobility, which improved their quality of life. Hence, a vast field of activities has become accessible for them. When prescribing a PW or in a learning phase, however, it is necessary to evaluate the ability of these people to drive a wheelchair. In this context, our goal is to determine relevant parameters to describe the quality of driving on PW for people with disabilities. First, we modeled the pilot-PW system using the OPCM (Optimal Preview Control Model) model proposed by Sharp. This model is based on the preview distance (Dp) of the user during his driving. This distance has been estimated thanks to an eye-tracking system combined with the ViEW 3D simulator of the LCOMS laboratory. A panel of 15 healthy subjects was recruited to drive the PW on a 3D simulator and to validate the OPCM modeling. This distance Dp allows to describe the behavior of the pilot. If this distance is important, it guarantees the tracking trajectory of the OPCM model. Otherwise, the OPCM model diverges. This shows that if the user looks a long part of his future path, he will better anticipate the future control applied to the PW (change of direction, braking, etc.), which allows him to follow his path. In this situation the user has a tracking behavior. In the otherwise, the user’s behavior is rather compensatory. Then, an analysis of preview distance Dp with respect to the different zones of the path (tight slalom, turn, wide slalom), showed that the parameter Dp can be used to differentiate the different driving behaviors related to the different situations of the path. Next, we compared the preview distance between two groups, familiar and novice with regard to the PW driving. The analysis showed that the familiar group has a greater distance value than the novice group. Finally, a last experiment took place at the Rehabilitation Center of Flavigny sur Moselle (54, France). We estimated the preview distance (Dp) for subjects with severe motor impairment, in order to validate the parameter Dp as a performance indicator. A case study analysis was established on five children with disabilities comparing their results with those previously obtained with the healthy subjects
Zatla, Hicham. „Modélisation et analyse comportementale du système Pilote-fauteuil roulant électrique“. Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0251.
Der volle Inhalt der QuelleThe Powered wheelchairs (PW) allowed many people with motor disabilities to find a suitable mobility, which improved their quality of life. Hence, a vast field of activities has become accessible for them. When prescribing a PW or in a learning phase, however, it is necessary to evaluate the ability of these people to drive a wheelchair. In this context, our goal is to determine relevant parameters to describe the quality of driving on PW for people with disabilities. First, we modeled the pilot-PW system using the OPCM (Optimal Preview Control Model) model proposed by Sharp. This model is based on the preview distance (Dp) of the user during his driving. This distance has been estimated thanks to an eye-tracking system combined with the ViEW 3D simulator of the LCOMS laboratory. A panel of 15 healthy subjects was recruited to drive the PW on a 3D simulator and to validate the OPCM modeling. This distance Dp allows to describe the behavior of the pilot. If this distance is important, it guarantees the tracking trajectory of the OPCM model. Otherwise, the OPCM model diverges. This shows that if the user looks a long part of his future path, he will better anticipate the future control applied to the PW (change of direction, braking, etc.), which allows him to follow his path. In this situation the user has a tracking behavior. In the otherwise, the user’s behavior is rather compensatory. Then, an analysis of preview distance Dp with respect to the different zones of the path (tight slalom, turn, wide slalom), showed that the parameter Dp can be used to differentiate the different driving behaviors related to the different situations of the path. Next, we compared the preview distance between two groups, familiar and novice with regard to the PW driving. The analysis showed that the familiar group has a greater distance value than the novice group. Finally, a last experiment took place at the Rehabilitation Center of Flavigny sur Moselle (54, France). We estimated the preview distance (Dp) for subjects with severe motor impairment, in order to validate the parameter Dp as a performance indicator. A case study analysis was established on five children with disabilities comparing their results with those previously obtained with the healthy subjects
Bücher zum Thema "Profilage et analyse comportementale"
Rivière, Vinca. Analyse du comportement appliquée à l'enfant et à l'adolescent. Villeneuve d'Ascq: Presss Universitaires du Septentrion, 2006.
Den vollen Inhalt der Quelle findenOlweus, Dan. Violences entre élèves, harcèlements et brutalités: Les faits, les solutions. Paris: ESF, 1999.
Den vollen Inhalt der Quelle findenTourrette, Catherine. Évaluer les enfants avec déficiences ou troubles du développement: Déficiences motrices, sensorielles ou mentales : troubles autistiques et troubles des apprentissages : tests, échelles, épreuves. Paris: Dunod, 2006.
Den vollen Inhalt der Quelle findenClochard, Séverine. Vive les filles!: Le guide de celles qui seront bientôt ados! Toulouse: Milan jeunesse, 2006.
Den vollen Inhalt der Quelle findenOverton, Terry. Assessing learners with special needs: An applied approach. 4. Aufl. Upper Saddle River, N.J: Merrill/Prentice Hall, 2003.
Den vollen Inhalt der Quelle findenZastrow, Charles. Understanding human behavior and the social environment. 5. Aufl. Belmont, CA: Brooks/Cole, Thomson Learning, 2001.
Den vollen Inhalt der Quelle findenZastrow, Charles. Understanding human behavior and the social environment. 5. Aufl. Belmont, CA: Brooks/Cole, Thomson Learning, 2001.
Den vollen Inhalt der Quelle findenFritz, Drasgow, und Olson-Buchanan Julie, Hrsg. Innovations in computerized assessment. Mahwah, N.J: Lawrence Erlbaum Associates, 1999.
Den vollen Inhalt der Quelle findenZastrow, Charles. Understanding human behavior and the social environment. 2. Aufl. Chicago: Nelson-Hall Publishers, 1990.
Den vollen Inhalt der Quelle findenZastrow, Charles. Understanding human behavior and the social environment. 4. Aufl. Chicago, Ill: Nelson-Hall, 1997.
Den vollen Inhalt der Quelle finden