Dissertations / Theses on the topic 'Calculs garantis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 dissertations / theses for your research on the topic 'Calculs garantis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Le, Corronc Euriell. "Modèles et calculs garantis pour les systèmes (min,+)-linéaires." Phd thesis, Université d'Angers, 2011. http://tel.archives-ouvertes.fr/tel-00665973.
Full textLouédec, Morgan. "Guaranteed ellipsoidal numerical method for the stability analysis of the formation control of a group of underwater robots." Electronic Thesis or Diss., Brest, École nationale supérieure de techniques avancées Bretagne, 2024. http://www.theses.fr/2024ENTA0007.
Full textIn the development of human marine activity, groups of underwater robots can automate certain tasks. Since these robots are difficult to localise because of the underwater constrains, they must move in formation to be reliable. While various theoretical controllers have been proposed to challenge these constrains, they still need to consider more complex constrains and to be tested on real systems. As for every autonomous system, the stability of the formation must be verified by a mathematical proof. However, the complexity of these nonlinear systems makes conventional Lyapunov method difficult to use. Thus, this thesis’ main objective is to develop guaranteed numerical methods, based on interval arithmetic, that can assist the stability proof. Based on ellipsoidal guaranteed propagation, a first method is designed for discrete time systems to compute an ellipsoidal domain of attraction. This method is then extended to continuous-time systems and then to synchronous hybrid systems which are more realistic modellings. In addition, the ellipsoidal propagation is extended to consider singular mappings and degenerate ellipsoids. Finally, some real world underwater formation control was achieved to illustrate the stability
Bouguerra, Soumaya. "Intégration des stratégies de maintenance dans le calcul des extensions de garantie." Thesis, Université de Lorraine, 2012. http://www.theses.fr/2012LORR0331/document.
Full textIn this study mathematical models are developed to study the opportunity provided by the extended warranty period for both two-dimensional and one-dimensional case for the consumer and the manufacturer of the product for different situations. We will express the total average cost incurred along the life cycle of the product, this to the two points of view: the consumer and the manufacturer. Also we will consider various options regarding maintenance policies to adopt (performing preventive maintenance or not) for the product during the following periods: the basic warranty period, the extended warranty period and post-warranty at the end of the life cycle of the product. We will express the total average cost incurred along the life cycle of the product for the consumer and the manufacturer. To test the performance of the analytical model, numerical calculations were performed to determine the area of compromise for the extended warranty
Bouguerra, Soumaya. "Intégration des stratégies de maintenance dans le calcul des extensions de garantie." Electronic Thesis or Diss., Université de Lorraine, 2012. http://www.theses.fr/2012LORR0331.
Full textIn this study mathematical models are developed to study the opportunity provided by the extended warranty period for both two-dimensional and one-dimensional case for the consumer and the manufacturer of the product for different situations. We will express the total average cost incurred along the life cycle of the product, this to the two points of view: the consumer and the manufacturer. Also we will consider various options regarding maintenance policies to adopt (performing preventive maintenance or not) for the product during the following periods: the basic warranty period, the extended warranty period and post-warranty at the end of the life cycle of the product. We will express the total average cost incurred along the life cycle of the product for the consumer and the manufacturer. To test the performance of the analytical model, numerical calculations were performed to determine the area of compromise for the extended warranty
Oudot, Steve. "Echantillonnage et maillage de surfaces avec garanties." Palaiseau, Ecole polytechnique, 2005. http://www.theses.fr/2005EPXX0060.
Full textTelle, Benoît. "Méthode ensembliste pour une reconstruction tridimensionnelle garanti par stéréovision." Montpellier 2, 2003. http://www.theses.fr/2003MON20177.
Full textStolf, Patricia. "Gestion de ressources pour des services déportés sur des grappes d'ordinateurs avec qualité de service garantie." Toulouse, INSA, 2004. https://tel.archives-ouvertes.fr/tel-00134873.
Full textMany high performance applications require lots of resources. Environment like clusters or grid is interesting for their execution. This thesis studies parallel or sequential applications on clusters with precise management of resources in order to define a level of quality of service. It deals with execution support model, applications needs expression and scheduling. Two approachs are proposed : one in a deterministic mode where every application running on a host is known and controled and the other one in a stochastic mode where some part of the load of the host is unknown. Every application belongs to one of the four classes of quality of service defined which determines the level of quality of service requested. Scheduling algorithms are proposed on clusters which guarantee quality of service. They are based on events simulation and differential equations deducted from markovian models. An extension of the algorithm on the grid level is presented. Applications are represented by a graph of communicating tasks. Algorithms are validated by simulation and are integrated in a resources manager (AROMA : scAlable Resources Manager and wAtcher). A model to invoice a client for the used resources is proposed
Mahmino, Ali. "Application du Codage Réseau aux Architectures à Garanties de Qualité de Service (QoS)." Thesis, Toulouse, INPT, 2009. http://www.theses.fr/2009INPT023H/document.
Full textThe Interest of network coding to improve the throughput or to optimize the use of the network capacity was clearly shown in various contexts. Certain work in particular showed that network coding allows to decrease the end-to-end transmission delay (maximum and average) of a package. This is due to the fact that the processing simultaneous of several packages in a coding node allows to reduce the maximum time spent by the packets in the buffers compared to a classical routing. In this thesis, we consider the application of network coding in the context of the networks providing quality-of-service (QoS) guarantees. Our contributions include the following. First, we propose three network coding strategies ensuring a level of QoS guaranteed expressed in terms of end-in-end delay. The first strategy, called "Network-Oriented Strategy (NOS)", is a random coding strategy. This coding strategy simply consists in combining the inputs packets present in the buffer of a node. It allows minimizing the time spent by the packets in the router's buffers. The weak point of this approach, as any random approach, is that it is not completely reliable. The two other strategies suggested implement a reliable strategy by using the concept of generation. The first, called "Flow-Oriented Strategy (FOS)" is based on the traditional definition of network coding whereas the second, called "Fast Forwarding Strategy (FFS)", allows reducing the packet's buffering delays by transferring them without awaiting all packets of the same generation. The maximum delays generated by different strategies have been evaluated at a coding node level by using network calculus. The end-to-end delay bounds have been then calculated for several types of networks. In most cases, these bounds are better than those obtained for the classical routing. The reliable network coding strategies and the routing strategy have been implemented and evaluated by simulation on networks studied previously. The results obtained show that the worst cases of end-in-end delays observed have the same behaviors as the calculated maximum theoretical bounds, thus validating the suggested strategies
Fregonese, Gabriele <1988>. "L'impatto delle valutazioni delle garanzie immobiliari sul calcolo dei requisiti patrimoniali delle banche." Master's Degree Thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1751.
Full textPascal, Patricia. "Gestion de ressources pour des services déportés sur des grappes d'ordinateurs avec qualité de service garantie." Phd thesis, INSA de Toulouse, 2004. http://tel.archives-ouvertes.fr/tel-00134873.
Full textBlaysat, Benoît. "Bornes garanties de l'erreur locale en élastoplasticité." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00662495.
Full textGning, El Hadji Amadou. "Localisation garantie d'automobiles : Contribution aux techniques de satisfaction de contraintes sur les intervalles." Phd thesis, Université de Technologie de Compiègne, 2006. http://tel.archives-ouvertes.fr/tel-00158375.
Full textAprès avoir mené cette étude et tiré des conclusions, deux contributions sont faites pour améliorer les techniques de satisfaction de contraintes utilisées. Dans un premier temps, la notion de "domaine de consistance" est introduite. Les propriétés qui lui sont associées permettent de résoudre de manière formelle des exemples de cycles. Grâce à cet outil, on améliore la précision des pavés obtenus tout en ayant une information précieuse du temps de calcul a priori. Dans un second temps, l'algorithme de propagation connu sous le nom de FALL/CLIMB permettant de résoudre de façon optimale un CSP ayant une représentation graphique sous forme de graphe est généralisé aux CSP vectorisés appelés "VCSP".
Millet, Anne. "Contribution à l'analyse et la garantie de délai dans les réseaux utilisant la discipline CBQ." Toulouse 3, 2006. http://www.theses.fr/2006TOU30206.
Full textPacket scheduling is one of the keys to the guarantee of quality of service in networks. We focus on the CBQ (Class Based Queueing) scheduling discipline which enables to share link resources among hierarchicaly organized traffic classes. CBQ has many advantages but is not fitted to deal with strict delay constraints. We review the methods that enable the analysis of a scheduling discipline properties, and we use these methods on CBQ. As this work highlights the main hindering points to deal with real-time traffic, we devise a variant of CBQ better fitted to such needs. We then propose another adaptation of CBQ for IEEE 802. 11e networks
Kueviakoe, Kangni. "Localisation multi-capteurs garantie : résolution d'un problème de satisfaction de contraintes." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112241/document.
Full textThis thesis deals with the vehicle locationand addresses the problem of SLAM (simultaneous localization and mapping). Several methods are used to solve this kind of problem. They can be classified into two broad categories of approaches: probabilistic approach and deterministic approaches. This work addresses the deterministic approaches and more precisely the approach based on interval analysis. The work has been conducted on real data sets collected in outdoor environments with proprioceptive and exteroceptive sensors.When multiple sensors providing complementary or redundant information are put into play, it is important to merge the data to improve the estimated pose. The approach detailed in this document uses the intervals methods and presents the localization problem as a constraint satisfaction problem.The resolution is done using a solver interval. Several solvers were compared. One thing is clear: local consistency algorithms do not address the uncertainty of the orientation. This thesis proposes a method of locating usable in real time applications and corrects the uncertainty in the heading of the vehicle. We compared our results with those of the extended Kalman filter (probabilistic reference method) and highlighted one of the interests of our method: the assurance of consistency of the pose (position and orientation of the mobile).This thesis proposes two contributions. The first is methodological. In the state of the art all works affirm the need (or obligation) to pre-decompose the constraints of the problem before the resolution step. Our work allows to prove otherwise. The second contribution relates to the reduction of the orientation uncertainty by combining constraint propagation and a bisection approach
Pled, Florent. "Vers une stratégie robuste et efficace pour le contrôle des calculs par éléments finis en ingénierie mécanique." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2012. http://tel.archives-ouvertes.fr/tel-00776633.
Full textDelanoue, Nicolas. "Algorithmes numériques pour l'analyse topologique : Analyse par intervalles et théorie des graphes." Phd thesis, Université d'Angers, 2006. http://tel.archives-ouvertes.fr/tel-00340999.
Full textDe nombreux problèmes, comme l'étude de l'espace des configurations d'un robot, se ramènent à une étude qualitative d'ensembles. Ici, la ``taille'' de l'ensemble importe peu, ce qui compte, c'est sa ``topologie''. Les méthodes proposées calculent des invariants topologiques d'ensembles. Les ensembles considérés sont décrits à l'aide d'inégalités $\mathcal{C}^{\infty}$. L'idée maîtresse est de décomposer un ensemble donné en parties contractiles et d'utiliser l'homologie de \v Cech.
La seconde partie de la thèse concerne l'étude de point
asymptotiquement stables des systèmes dynamiques (linéaires ou non). Plus largement, on propose une méthode pour approcher le bassin d'attraction d'un point asymptotiquement stable. Dans un premier temps, on utilise la théorie de Lyapunov et le calcul par intervalle
pour trouver effectivement un voisinage inclus dans le bassin d'attraction d'un point prouvé asymptotiquement stable. Puis, on combine, une fois de plus, la théorie des graphes et les méthodes d'intégration d'équations différentielles ordinaires pour améliorer ce voisinage et ainsi construire un ensemble inclus dans le bassin
d'attraction de ce point.
Mor, Stefano Drimon Kurz. "Analyse des synchronisations dans un programme parallèle ordonnancé par vol de travail. Applications à la génération déterministe de nombres pseudo-aléatoires." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM024/document.
Full textWe present two contributions to the field of parallel programming.The first contribution is theoretical: we introduce SIPS analysis, a novel approach to estimate the number of synchronizations performed during the execution of a parallel algorithm.Based on the concept of logical clocks, it allows us: on one hand, to deliver new bounds for the number of synchronizations, in expectation; on the other hand, to design more efficient parallel programs by dynamic adaptation of the granularity.The second contribution is pragmatic: we present an efficient parallelization strategy for pseudorandom number generation, independent of the number of concurrent processes participating in a computation.As an alternative to the use of one sequential generator per process, we introduce a generic API called Par-R, which is designed and analyzed using SIPS.Its main characteristic is the use of a sequential generator that can perform a ``jump-ahead'' directly from one number to another on an arbitrary distance within the pseudorandom sequence.Thanks to SIPS, we show that, in expectation, within an execution scheduled by work stealing of a "very parallel" program (whose depth or critical path is subtle when compared to the work or number of operations), these operations are rare.Par-R is compared with the parallel pseudorandom number generator DotMix, written for the Cilk Plus dynamic multithreading platform.The theoretical overhead of Par-R compares favorably to DotMix's overhead, what is confirmed experimentally, while not requiring a fixed generator underneath
Medlej, Sara. "Scalable Trajectory Approach for ensuring deterministic guarantees in large networks." Thesis, Paris 11, 2013. http://www.theses.fr/2013PA112168/document.
Full textIn critical real-time systems, any faulty behavior may endanger lives. Hence, system verification and validation is essential before their deployment. In fact, safety authorities ask to ensure deterministic guarantees. In this thesis, we are interested in offering temporal guarantees; in particular we need to prove that the end-to-end response time of every flow present in the network is bounded. This subject has been addressed for many years and several approaches have been developed. After a brief comparison between the existing approaches, the Trajectory Approach sounded like a good candidate due to the tightness of its offered bound. This method uses results established by the scheduling theory to derive an upper bound. The reasons leading to a pessimistic upper bound are investigated. Moreover, since the method must be applied on large networks, it is important to be able to give results in an acceptable time frame. Hence, a study of the method’s scalability was carried out. Analysis shows that the complexity of the computation is due to a recursive and iterative processes. As the number of flows and switches increase, the total runtime required to compute the upper bound of every flow present in the network understudy grows rapidly. While based on the concept of the Trajectory Approach, we propose to compute an upper bound in a reduced time frame and without significant loss in its precision. It is called the Scalable Trajectory Approach. After applying it to a network, simulation results show that the total runtime was reduced from several days to a dozen seconds
Turki, Marwa. "Synthèse de contrôleurs prédictifs auto-adaptatifs pour l'optimisation des performances des systèmes." Thesis, Normandie, 2018. http://www.theses.fr/2018NORMR064.
Full textEven though predictive control uses concrete parameters, the value of these latter has a strong impact on the obtained performances from the system to be controlled. Their tuning is not trivial. That is why the literature reports a number of adjustment methods. However, these ones do not always guarantee optimal values. The goal of this thesis is to propose an analytical and original tuning tuning approach of these parameters. Initially applicable to linear MIMO systems, the proposed approach has been extended to non-linear systems with or without constraints and for which a Takagi-Sugeno (T-S) model exists. The class of nonlinear systems considered here is written in quasi-linear parametric form (quasi-LPV). Assuming that the system is controllable and observable, the proposed method guarantees the optimal stability of this closed-loop system. To do this, it relies, on the one hand, on a conditioning improving technique of the Hessian matrix and, on the other hand, on the concept of effective rank. It also has the advantage of requiring a lower computational load than the approaches identified in the literature. The interest of the proposed approach is shown through the simulation on different systems of increasingcomplexity. The work carried out has led to a self-adaptive predictive control strategy called "ATSMPC" (Adaptive Takagi-Sugeno Model-based Predictive Control)