Dissertations / Theses on the topic 'Code non sûr'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 dissertations / theses for your research on the topic 'Code non sûr.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Carpentier, Robin. "Privacy-preserving third-party computations on secure personal data management systems." Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG079.
Full textThe privacy of individuals is constantly undermined by some of the most prominent companies in the world which centralize vast amounts of personal data. Recent legal means such as the General Data Protection Regulation in Europe regulate the collection and processing of citizens' data. In particular, data portability grants individuals the right to recover a copy of their data held by an organization. At the same time, Personal Data Management Systems (PDMS) are emerging, empowering users by facilitating the management of their data. For example, these solutions enable automatic data collection, sharing, and advanced processing. In these solutions, the user's data is processed directly where it is stored by a processing code potentially written by a third party. Here, only the results are shared with a third party upon the user's decision. This paradigm diverges from the traditional approach in which the user's data is entirely shared with a third party for processing. To be viable, PDMS must satisfy two prerequisites: they must ensure the security of the data in the presence of a layman user while being as extensible as possible to support diverse computations on this data. To address this conflict between extensibility and security, this thesis relies on an architecture including third-party modules coupled with hardware security mechanisms called Trusted Executions Environments. In this context, we propose security building blocks to limit data leakage resulting from the use of these third-party modules as well as execution strategies implementing these building blocks and limiting the impact on performances
Quintin, Guillaume. "Sur l'algorithme de décodage en liste de Guruswami-Sudan sur les anneaux finis." Phd thesis, Ecole Polytechnique X, 2012. http://pastel.archives-ouvertes.fr/pastel-00759820.
Full textShams, Bilal. "Les Codes LDPC non-binaires de nouvelle génération." Thesis, Cergy-Pontoise, 2010. http://www.theses.fr/2010CERG0525/document.
Full textIn this thesis we present our work in the domain of non-binary decoding algorithm for general classes of non-binary LDPC codes. Low-Density Parity-Check (LDPC) codes were originally presented by Gallager in 1963, and after some fundamental theoretical advancements, they were considered in standards like DVB-S2, WI-MAX, DSL, W-LAN etc. Later on, non-binary LDPC (NB-LDPC)codes were proposed in the litterature, and showed better performance for small lengths or when used on non-binary channels. However, the advantages of using NB-LDPC codes comes with the consequence of an heavily increased decoding complexity. For a code defined in GF(q), the complexity is of the order O(q^2). Similarly, the memory required for storing messages is of order O(q). Consequently, the implementation of an LDPC-decoder defined over a field order q > 64 becomes practically impossible.The main objective of the thesis is to develop reduced complexity algorithms for non-binary LDPC codes that exhibit excellent performance and is practically im-plementable. For better decoding performance, not only the decoding algorithm is important, but also the structure of the code plays an important role. With this goal in mind, a new family of codes called cluster-NB-LDPC codes was developped and specific improvements of the NB decoder for cluster-NB-LDPC codes were proposed. Our principal result is that we were able to propose decoders for cluster-NB-LDPC codes with reduced complexity compared to usual decoders for NB-LDPC codes on fields, without any performance loss in error correction capability
Stenger, Jérôme. "Optimal uncertainty quantification of a risk measurement from a computer code." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30082.
Full textUncertainty quantification in a safety analysis study can be conducted by considering the uncertain inputs of a physical system as a vector of random variables. The most widespread approach consists in running a computer model reproducing the physical phenomenon with different combinations of inputs in accordance with their probability distribution. Then, one can study the related uncertainty on the output or estimate a specific quantity of interest (QoI). Because the computer model is assumed to be a deterministic black-box function, the QoI only depends on the choice of the input probability measure. It is formally represented as a scalar function defined on a measure space. We propose to gain robustness on the quantification of this QoI. Indeed, the probability distributions characterizing the uncertain input may themselves be uncertain. For instance, contradictory expert opinion may make it difficult to select a single probability distribution, and the lack of information in the input variables affects inevitably the choice of the distribution. As the uncertainty on the input distributions propagates to the QoI, an important consequence is that different choices of input distributions will lead to different values of the QoI. The purpose of this thesis is to account for this second level uncertainty. We propose to evaluate the maximum of the QoI over a space of probability measures, in an approach known as optimal uncertainty quantification (OUQ). Therefore, we do not specify a single precise input distribution, but rather a set of admissible probability measures defined through moment constraints. The QoI is then optimized over this measure space. After exposing theoretical results showing that the optimization domain of the QoI can be reduced to the extreme points of the measure space, we present several interesting quantities of interest satisfying the assumption of the problem. This thesis illustrates the methodology in several application cases, one of them being a real nuclear engineering case that study the evolution of the peak cladding temperature of fuel rods in case of an intermediate break loss of coolant accident
Dyshko, Serhii. "Généralisations du Théorème d'Extension de MacWilliams." Electronic Thesis or Diss., Toulon, 2016. http://www.theses.fr/2016TOUL0018.
Full textThe famous MacWilliams Extension Theorem states that for classical codes each linear Hamming isometry ofa linear code extends to a monomial map. However, for linear codes over module alphabets an analogue of theextension theorem does not always exist. That is, there may exists a linear code over a module alphabet with anunextendable Hamming isometry. The same holds in a more general context of a module alphabet equippedwith a general weight function. Analogues of the extension theorem for different classes of codes, alphabetsand weights are proven in the present thesis. For instance, extension properties of the following codes arestudied: short codes over a matrix module alphabet, maximum distance separable codes, codes over a modulealphabet equipped with the symmetrized weight composition. As a separate result, a classification of twoisometry groups of combinatorial codes is given. The thesis also contains applications of the developedtechniques to quantum stabilizer codes and Gabidulin codes
Mokadem, Azza. "Analysis of scattering by urban areas in the frame of NLOS target detection in SAR images." Thesis, Supélec, 2014. http://www.theses.fr/2014SUPL0004/document.
Full textSynthetic Aperture Radar (SAR) systems have been used since many years for military applications such as the detection of hidden targets. With improved resolutions of these systems, high level of details can be distinguished in the corresponding images. However, some difficulties are encountered when analyzing the SAR images of urban areas. In particular, in these areas, many physical phenomena and interactions occur that make the detection of a target a challenging task. In this framework, the goal of the thesis is to investigate the feasibility of detecting Non Line Of Sight targets inside a simple and representative scene: the urban canyon. A study of the electromagnetic (EM) phenomenology of propagation inside urban canyons has been performed using indoor data at a reduced scale. These data allowed the validation of an EM commercial tool that studies the EM propagation at a real scale. Based on the results of simulation of this code, an in-house code was developed dedicated to predict the detection of a target inside an urban canyon and to analyze the corresponding EM signature. Moreover, this code contributed to a full interpretation of InSAR data of a real complex urban scene with targets
Dyshko, Serhii. "Généralisations du Théorème d'Extension de MacWilliams." Thesis, Toulon, 2016. http://www.theses.fr/2016TOUL0018/document.
Full textThe famous MacWilliams Extension Theorem states that for classical codes each linear Hamming isometry ofa linear code extends to a monomial map. However, for linear codes over module alphabets an analogue of theextension theorem does not always exist. That is, there may exists a linear code over a module alphabet with anunextendable Hamming isometry. The same holds in a more general context of a module alphabet equippedwith a general weight function. Analogues of the extension theorem for different classes of codes, alphabetsand weights are proven in the present thesis. For instance, extension properties of the following codes arestudied: short codes over a matrix module alphabet, maximum distance separable codes, codes over a modulealphabet equipped with the symmetrized weight composition. As a separate result, a classification of twoisometry groups of combinatorial codes is given. The thesis also contains applications of the developedtechniques to quantum stabilizer codes and Gabidulin codes
Lorendeau, Benjamin. "Amélioration des performances via un parallélisme multi-niveaux en maillage sur un code de CFD en maillages non structurés." Thesis, Bordeaux, 2019. http://www.theses.fr/2019BORD0412.
Full textThe ever-evolving and ultimately complexification of computer architectures enforce scientific developpers to maintain both their software and technical knowledge in order to pertain their ability to fully exploit recent high performance computing platforms. Moreover the birth of heterogeneous plateforms and the large increase in core number per processor lead developpers of software parallelized through distributed paralleslim to see a small but consistent decrease of performance on recent plateforms. For cs, the transission from a full MPI code to a MPI+OpenMP code is not fully satisfying and cannot adress the scalability issue that alack of load balancing causes. This load balancing issue is a complex problemto solve for a code such as cs where partitionning is a NP problem and mustdata being indexed due to the unstructured nature of the meshes used. To solvethis kind of issue and many others (such as portability and heterogeneity), the use of a task based runtime recently won popularity through three different ways: loop parallelism, sequential submission of task(STF) or parameterized task graph (PTG). This thesis is focused on the transition effort of cs, a computational fluid dynamic (CFD) code with unstructured meshes (sparse linear algebra) from a mostly distributed parallelism to the integration of a task based runtime. In order to do this,we investigated the STF and PTG paradigms through the use of StarPU and PaRSECin cs. We demonstrate their advantages over a solution such that MPI + OpenMP as well ascompare their use in terms of complexity and performance with the existing solutions in cs. This thesis was made through the collaboration between the MFEE department of EDF R&D and the Tadaam research team, grouping Inria Bordeaux Sud-Ouest, the LaBRI,University of Bordeaux 1 and Bordeaux INP
Masiero, Matteo <1998>. "L’utilizzo del crowdfunding come sostegno per le organizzazioni non governative. Il caso delle SAR NGO." Master's Degree Thesis, Università Ca' Foscari Venezia, 2022. http://hdl.handle.net/10579/21919.
Full textZrelli, Yasamine. "Identification aveugle de codes correcteurs d'erreurs basés sur des grands corps de Galois et recherche d'algorithmes de type décision souple pour les codes convolutifs." Thesis, Brest, 2013. http://www.theses.fr/2013BRES0097/document.
Full textIn the first part of this thesis, we have focused on the blind identification of non-binary error correcting codes over the Galois field GF(2m). A study of the properties of Galois fields and non-binarycodes has been presented so as to get the essential elements for a blind identification of non-binary codes parameters. From the knowledge of only the received symbols, methods have been developed to identify the code parameters in the case of a noiseless transmission. The relevance of this approach has been highlighted when the parameters of the used Galois field are known bythe receiver. A theoretical study of rank criterion behaviors has been also presented to justify its use by the most existing identification methods. Then, three blind identification methods of the codeword size for binary and non-binary linear codes have been developped in the framework of a noisy transmission. In order to identify a dual code basis, an existing method for binary codes based on the use of a hard decision demodulation has been generalized to non-binary codes. The detection performance of this technique has been improved when an iterative process based on the joint use of a soft-decision demodulator and a soft-decision iterative decoding is introduced. In the second part of this thesis manuscript, a mathematical formalism is proposed in order to investigate the impact of mapping-demapping functions on linear algebra computations and properties over Galois field in the case of non-binary error correcting codes. Finally, this formalism has been exploited to detect or/and correct some digital transmission problems such as a bad synchronization. Finally, we have studied the impact of some mapping-demapping functions on the blind identification ofnon-binary error correcting codes parameters
Le, Dez Thomas. "Approche par similitude du couplage des effets thermiques et du vent sur les transferts de masse dans les réseaux aérauliques des bâtiments complexes." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS006/document.
Full textResidential and industrial buildings equipped with a ventilation system are complex facilities, where heat and mass transfers could occur according to the operating conditions. In order to study these mass transfers, a methodology has been developed to reduced-scale experimentations for non isothermal flows study. This methodology has been numerically validated, and then applied to a standard configuration, representing of the ventilation systems operating principle which are encounter in the nuclear field. The wind and the thermal phenomena influences on the mass transfers inside this configuration have been studied in the Jules Verne climatic wind tunnel of the CSTB for various operating ventilation system situations (normal operating ventilation system, stopping ventilation or protection rate of productivity) and scenarios of heat supply. These thermal sources can be generated by an industrial process or a fire. They have been reproduced experimentally with an helium injection. The effects of the heat sources coupled or not with wind on loss of building containment were highlighted and analyzed. The reliability of the zonal code SYLVIA, used notably to support safety assessment in nuclear buildings, has been analyzed from these experimental results. The modelling of the physical phenomena experimentally observed has been validated. The leakage flowrates reversals have been retrieved with the SYLVIA code. A comparison between the calculations where the heat source has been simulated with an helium injection and with a thermal power permitted to observe the mass injection effect has been caused by the helium on the pressures, the flowrates and the temperatures
Muzeau, Jean-Pierre. "Modele de l'influence d'imperfections sur la securite des structures metalliques en comportement non lineaire : comparaison de reglements internationaux." Clermont-Ferrand 2, 1987. http://www.theses.fr/1987CLF2E378.
Full textCaullery, Florian. "Polynomes sur les corps finis pour la cryptographie." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM4013/document.
Full textFunctions from F_q to itself are interesting objects arising in various domains such as cryptography, coding theory, finite geometry or algebraic geometry. It is well known that these functions admit a univariate polynomial representation. There exists many interesting classes of such polynomials with plenty of applications in pure or applied maths. We are interested in three of them: Almost Perfect Nonlinear (APN) polynomials, Planar (PN) polynomials and o-polynomials. APN polynomials are mostly used in cryptography to provide S-boxes with the best resistance to differential cryptanalysis and in coding theory to construct double error-correcting codes. PN polynomials and o-polynomials first appeared in finite geometry. They give rise respectively to projective planes and ovals in P^2(F_q). Also, their field of applications was recently extended to symmetric cryptography and error-correcting codes.A complete classification of APN, PN and o-polynomials is an interesting open problem that has been widely studied by many authors. A first approach toward the classification was to consider only power functions and the studies were recently extended to polynomial functions.One way to face the problem of the classification is to consider the polynomials that are APN, PN or o-polynomials over infinitely many extensions of F_q, namely, the exceptional APN, PN or o-polynomials.We improve the partial classification of exceptional APN and PN polynomials and give a full classification of exceptional o-polynomials. The proof technique is based on the Lang-Weil bound for the number of rational points in algebraic varieties together with elementary methods
Braconnier, Thierry. "Sur le calcul des valeurs propres en précision finie." Nancy 1, 1994. http://www.theses.fr/1994NAN10023.
Full textChau, Ngoc An. "Analyse de l'influence des caractéristiques mécaniques et hydrauliques sur le comportement des barrages en terre et en enrochement." Grenoble INPG, 1999. http://www.theses.fr/1999INPG0005.
Full textSyed, Tamseel Mahmood. "Precoder Design Based on Mutual Information for Non-orthogonal Amplify and Forward Wireless Relay Networks." University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1392043776.
Full textFakhfakh, Manel. "Réconcilier performance et prédictibilité sur un many-coeur en utilisant des techniques d'ordonnancement hors-ligne." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066145/document.
Full textOn-chip networks (NoCs) used in multiprocessor systems-on-chips (MPSoCs) pose significant challenges to both on-line (dynamic) and off-line (static) real-time scheduling approaches. They have large numbers of potential contention points, have limited internal buffering capabilities, and network control operates at the scale of small data packets. Therefore, efficient resource allocation requires scalable algorithms working on hardware models with a level of detail that is unprecedented in real-time scheduling. We consider in this thesis a static scheduling approach, and we target massively parallel processor arrays (MPPAs), which are MPSoCs with large numbers (hundreds) of processing cores. We first identify and compare the hardware mechanisms supporting precise timing analysis and efficient resource allocation in existing MPPA platforms. We determine that the NoC should ideally provide the means of enforcing a global communications schedule that is computed off-line (before execution) and which is synchronized with the scheduling of computations on processors. On the software side, we propose a novel allocation and scheduling method capable of synthesizing such global computation and communication schedules covering all the execution, communication, and memory resources in an MPPA. To allow an efficient use of the hardware resources, our method takes into account the specificities of MPPA hardware and implements advanced scheduling techniques such as pre-computed preemption of data transmissions. We evaluate our technique by mapping two signal processing applications, for which we obtain good latency, throughput, and resource use figures
Veyrat-Durebex, François Pierre. "Influences economiques sur le droit des successions dans son elaboration depuis 1804 : analyse comparative des metasources économiques et non-économiques." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSE3015.
Full textTo start with, we can notice that at the beginning of the twenty-first century, the economic sphere is already clearly influencing the inheritance rules modification process. Admittedly, this is not an official statement. Writing the law n ° 2006-728 of June 23, 2006 which aims to reform the inheritances and liberalities regulations, the legislator prefers to highlight general objectives. This is a question of "simplifying", "speeding up" and "securing" the inheritance law. If all of this may seem very transparent at first glance, in reality, behind this "a little short profession of faith", there are some hidden economic objectives that cross the whole reform. The simplest example to cite is the survival of a company at the death of its manager. This objective is easily visible; it helps to facilitate the transmission of the economic unit, [...], but also to ensure its management continuity [...]. [...] Further, the dialectics followed by the legislator of the twenty-first century are not only for adaptation of legal norms to contemporary economic realities, but also for promoting these standards as instruments to increase the national economy's competitiveness. Legislation is now conceived as a driving force for the economic situation. [...] Multiplying trade, relaunching growth, enhancing French economic patrimony: these are some of the new values of inheritance regulations, as defined by the law of 23 June 2006. However, is this influence of the economic sphere entirely new or not ? Perhaps, we are dealing with culmination or prolongation of an old phenomenon ? We may indeed think that the legislators have already been concerned with adapting our old French law to the advent of proto-industry, as well as to the development of the trading economy ; in the same sense, it should be noted that, for the most part, the law n° 71-523 of July 3d, 1971 has done nothing more than making an adjustment of the liquidation rules to the monetary fluctuations of the post-war period. Without going further into the details, we can immediately notice how these questions lead us to the present study : a comparative analysis of "economic" and "non-economic" metasources, on the subject of influence of the economic sphere on the inheritance rights in its development since 1804
Niel, Paul. "Essai sur les fonctions du juge administratif face aux principes civils du contrat de transaction." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1017.
Full textParticipant of a mixed nature, by its contractual source, legal in its object, the transaction and allows the parties to end a dispute arising or prevent future litigation. It has a remarkable usefulness for administrative matters. The transaction, civil law concept borrowed by the administrative judge, gave rise to various interpretations praetorian. The law is not static, the administrative judge, under cover of a personal philosophy, worked to preserve its interests gradually detaching civilians principles of contract transaction. The term "administrative transaction" refers to the fact that the transaction is entered into by or on behalf of a public entity. This can however be a private contract or an administrative contract. Admittedly, the term "administration" can be interpreted broadly and narrowly. Litigation of the transaction is booming. Has long been public law borrows the civil rules of contract transaction subject to different legal regimes. Serious difficulties remain. Also, it was necessary to demonstrate why and how the administrative judge undertook a clarification of the law of the transaction in administrative matters. The study was an opportunity to distinguish the function of adaptation and systematization of administrative courts, where this differentiation was rarely considered
Chaouche, Nadia. "Effets et mécanismes d'action des protéines non structurales et de la protéine de Capside Core du virus de l'hépatite C sur le métabolisme de l'acide arachidonique des monocytes humains." Toulouse 3, 2002. http://www.theses.fr/2002TOU30033.
Full textVenturi, Silvio. "La réduction du prix de vente en cas de défaut ou de non-conformité de la chose : le Code suisse des obligations et la Convention des Nations Unies sur les contrats de vente internationale de marchandises /." Fribourg, Suisse : Éd. Univ, 1994. http://www.gbv.de/dms/spk/sbb/recht/toc/271954159.pdf.
Full textAbdallah, Laure. "Worst-case delay analysis of core-to-IO flows over many-cores architectures." Phd thesis, Toulouse, INPT, 2017. http://oatao.univ-toulouse.fr/17836/1/abdallah_2.pdf.
Full textGuerrero, Jesús. "Valorisation du méthane par reformage sec en régimes stationnaire et non-stationnaire sur catalyseurs à base de nickel : mise en œuvre d'un réacteur à alimentation périodique." Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10162/document.
Full textNowadays the society is concerned about the greenhouse effect, and the necessity to find alternative procedures and more sustainable and durable processes to obtain the products made from petroleum. The valorization of CH4 with CO2 (dry reforming) brings the advantage of consuming gases which contribute strongly to the greenhouse effect. This reaction produces H2 and CO, which jointly or separately, are the raw materials for different processes producing energy and chemicals.Ni-Ce-O and Ni-Mg-Al-O based catalysts were successfully prepared. The influence of different parameters was studied, such as the Ni loading and the reaction temperature (600°C-800°C). The main difficulties are the formation of coke leading to rapid catalyst deactivation due to the high operating temperatures and the simultaneous presence of CO2 (reactant) and hydrogen (product) which leads, by the reverse water gas shift (RWGS), to a loss in selectivity. A process which can avoid this kind of problematics consists in exposing alternately each of the reactants. Initially the solid acts as oxygen carrier reacting with methane to form carbon monoxide (1 mole) and hydrogen (2 moles). As the solid is regenerated at each cycle, the deactivation by carbon deposition is avoided. The activity and selectivity of the solid is provided by the presence of a reducible oxide (CeO2) and a metal (Ni, Co), which cannot be reoxidized under the experimental conditions ensuring the activation of methane. Different physicochemical characterizations were performed on catalysts to find correlations between the catalytic activity and properties of the solids
Fakhfakh, Manel. "Réconcilier performance et prédictibilité sur un many-coeur en utilisant des techniques d'ordonnancement hors-ligne." Electronic Thesis or Diss., Paris 6, 2014. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2014PA066145.pdf.
Full textOn-chip networks (NoCs) used in multiprocessor systems-on-chips (MPSoCs) pose significant challenges to both on-line (dynamic) and off-line (static) real-time scheduling approaches. They have large numbers of potential contention points, have limited internal buffering capabilities, and network control operates at the scale of small data packets. Therefore, efficient resource allocation requires scalable algorithms working on hardware models with a level of detail that is unprecedented in real-time scheduling. We consider in this thesis a static scheduling approach, and we target massively parallel processor arrays (MPPAs), which are MPSoCs with large numbers (hundreds) of processing cores. We first identify and compare the hardware mechanisms supporting precise timing analysis and efficient resource allocation in existing MPPA platforms. We determine that the NoC should ideally provide the means of enforcing a global communications schedule that is computed off-line (before execution) and which is synchronized with the scheduling of computations on processors. On the software side, we propose a novel allocation and scheduling method capable of synthesizing such global computation and communication schedules covering all the execution, communication, and memory resources in an MPPA. To allow an efficient use of the hardware resources, our method takes into account the specificities of MPPA hardware and implements advanced scheduling techniques such as pre-computed preemption of data transmissions. We evaluate our technique by mapping two signal processing applications, for which we obtain good latency, throughput, and resource use figures
Da, penha coelho Alexandre Augusto. "Tolérance aux fautes et fiabilité pour les réseaux sur puce 3D partiellement connectés." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT054.
Full textNetworks-on-Chip (NoC) have emerged as a viable solution for the communication challenges in highly complex Systems-on-Chip (SoC). The NoC architecture paradigm, based on a modular packet-switched mechanism, can address many of the on-chip communication challenges such as wiring complexity, communication latency, and bandwidth. Furthermore, the combined benefits of 3D IC and Networks-on-Chip (NoC) schemes provide the possibility of designing a high-performance system in a limited chip area. The major advantages of Three-Dimensional Networks-on-Chip (3D-NoCs) are a considerable reduction in the average wire length and wire delay, resulting in lower power consumption and higher performance. However, 3D-NoCs suffer from some reliability issues such as the process variability of 3D-IC manufacturing. In particular, the low yield of vertical connection significantly impacts the design of three-dimensional die stacks with a large number of Through Silicon Via (TSV). Equally concerning, advances in integrated circuit manufacturing technologies are resulting in a potential increase in their sensitivity to the effects of radiation present in the environment in which they will operate. In fact, the increasing number of transient faults has become, in recent years, a major concern in the design of critical SoC. As a result, the evaluation of the sensitivity of circuits and applications to events caused by energetic particles present in the real environment is a major concern that needs to be addressed. So, this thesis presents contributions in two important areas of reliability research: in the design and implementation of deadlock-free fault-tolerant routing schemes for the emerging three-dimensional Networks-on-Chips; and in the design of fault injection frameworks able to emulate single and multiple transient faults in the HDL-based circuits. The first part of this thesis addresses the issues of transient and permanent faults in the architecture of 3D-NoCs and introduces a new resilient routing computation unit as well as a new runtime fault-tolerant routing scheme. A novel resilient mechanism is introduced in order to tolerate transient faults occurring in the route computation unit (RCU), which is the most important logical element in NoC routers. Failures in the RCU can provoke misrouting, which may lead to severe effects such as deadlocks or packet loss, corrupting the operation of the entire chip. By combining a reliable fault detection circuit leveraging circuit-level double-sampling, with a cost-effective rerouting mechanism, we develop a full fault-tolerance solution that can efficiently detect and correct such fatal errors before the affected packets leave the router. Yet in the first part of this thesis, a novel fault-tolerant routing scheme for vertically-partially-connected 3D Networks-on-Chip called FL-RuNS is presented. Thanks to an asymmetric distribution of virtual channels, FL-RuNS can guarantee 100% packet delivery under an unconstrained set of runtime and permanent vertical link failures. With the aim to emulate the radiation effects on new SoCs designs, the second part of this thesis addresses the fault injection methodologies by introducing two frameworks named NETFI-2 (Netlist Fault Injection) and NoCFI (Networks-on-Chip Fault Injection). NETFI-2 is a fault injection methodology able to emulate transient faults such as Single Event Upsets (SEU) and Single Event Transient (SET) in a HDL-based (Hardware Description Language) design. Extensive experiments performed on two appealing case studies are presented to demonstrate NETFI-2 features and advantage. Finally, in the last part of this work, we present NoCFI as a novel methodology to inject multiple faults such as MBUs and SEMT in a Networks-on-Chip architecture. NoCFI combines ASIC-design-flow, in order to extract layout information, and FPGA-design-flow to emulate multiple transient faults
Koshelev, Dmitrii. "Nouvelles applications des surfaces rationnelles et surfaces de Kummer généralisées sur des corps finis à la cryptographie à base de couplages et à la théorie des codes BCH." Thesis, université Paris-Saclay, 2021. http://www.theses.fr/2021UPASM001.
Full textThere is well developed theory of so-called toric codes, i.e., algebraic geometry codes on toric varieties over a finite field. Besides ordinary (i.e., split) tori and toric varieties there are non-split ones. Therefore the thesis is dedicated to the study of algebraic geometry codes on the latter
Arlery, Fabien. "Formes d’ondes MSPSR, traitements et performances associés." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0005/document.
Full textNowadays, MSPSR (Multi-Static Primary Surveillance Radar) systems are sustainably settled in air surveillance program [1]. Compared to mono-static radar currently in use, an MSPSR system is based on a sparse network of transmitters (Tx) and receivers (Rx) interconnected to a Central Unit and offers advantages in terms of reliability, cost and performance.Two kinds of MSPSR systems exist: the Passive form and the Active one. While the Passive MSPSR uses transmitters of opportunity such as radio Frequency Modulation (FM) transmitters and/or Digital Video Broadcasting-Terrestrial (DVB-T) transmitters [2], the Active MSPSR uses dedicated transmitters, which emit a waveform that is controlled and designed for a radar application. Each receiver processes the signal coming from all transmitters and reflected on the targets; and the Central Unit restores the target location by intersecting “ellipsoids” from all (transmitter, receiver) pairs. Compared to passive MSPSR, the main advantages of the active MSPSR are the use of dedicated waveforms that allow reaching better performances (like a better association of the transmitters’ contributions at the receiver level); more flexibility in the deployment of transmitters and receivers station (in order to meet the requirements in localisation accuracy and in horizontal and altitude coverages); and the guarantee of having a service continuity. On this purpose, this thesis analyses the differents codes criteria such as the ambiguity function behaviour, the PAPR (Peak to Average Power Ratio), the spectrum efficiency, etc... . Then, in order to find dedicated waveforms for MSPSR systems, one solution is to find easily-constructed families of sequences. Thus building on the works carried out by the Telecommunication field for solving multi-user issues, this document investigates the application of spreading codes and OFDM signals in MSPSR concept. Besides, another solution is to directly generate a set of sequences. Based on cyclic algorithms in [3] we derive a new algorithm that allows to optimize sets of sequences. Similarly, using a gradient descent approach, we develop a more efficient algorithm than the cyclic one. Finally, in order to evaluate the performances of the different algorithms, this thesis generalizes the Levenshtein Bound, establishes new lower bounds on the PSLR (Peak Sidelobe Level Ratio) in mismatched filter case, and studies real data recorded during some trials
Arlery, Fabien. "Formes d’ondes MSPSR, traitements et performances associés." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0005.
Full textNowadays, MSPSR (Multi-Static Primary Surveillance Radar) systems are sustainably settled in air surveillance program [1]. Compared to mono-static radar currently in use, an MSPSR system is based on a sparse network of transmitters (Tx) and receivers (Rx) interconnected to a Central Unit and offers advantages in terms of reliability, cost and performance.Two kinds of MSPSR systems exist: the Passive form and the Active one. While the Passive MSPSR uses transmitters of opportunity such as radio Frequency Modulation (FM) transmitters and/or Digital Video Broadcasting-Terrestrial (DVB-T) transmitters [2], the Active MSPSR uses dedicated transmitters, which emit a waveform that is controlled and designed for a radar application. Each receiver processes the signal coming from all transmitters and reflected on the targets; and the Central Unit restores the target location by intersecting “ellipsoids” from all (transmitter, receiver) pairs. Compared to passive MSPSR, the main advantages of the active MSPSR are the use of dedicated waveforms that allow reaching better performances (like a better association of the transmitters’ contributions at the receiver level); more flexibility in the deployment of transmitters and receivers station (in order to meet the requirements in localisation accuracy and in horizontal and altitude coverages); and the guarantee of having a service continuity. On this purpose, this thesis analyses the differents codes criteria such as the ambiguity function behaviour, the PAPR (Peak to Average Power Ratio), the spectrum efficiency, etc... . Then, in order to find dedicated waveforms for MSPSR systems, one solution is to find easily-constructed families of sequences. Thus building on the works carried out by the Telecommunication field for solving multi-user issues, this document investigates the application of spreading codes and OFDM signals in MSPSR concept. Besides, another solution is to directly generate a set of sequences. Based on cyclic algorithms in [3] we derive a new algorithm that allows to optimize sets of sequences. Similarly, using a gradient descent approach, we develop a more efficient algorithm than the cyclic one. Finally, in order to evaluate the performances of the different algorithms, this thesis generalizes the Levenshtein Bound, establishes new lower bounds on the PSLR (Peak Sidelobe Level Ratio) in mismatched filter case, and studies real data recorded during some trials
Soro, Russell Olivier. "El contrato normativo : análisis de una categoría." Thesis, Bordeaux 4, 2013. http://www.theses.fr/2013BOR40017.
Full textHow far are now individuals free to create the most appropriate contractual tool to achieve the satisfaction of their needs and interests? What they have in common figures as diverse as a joint-venture agreement, a franchise agreement or a marriage contract? Is the old general theory of contract adapted to the contractual practice of the XXI century? A deep study of the normative contract in this book provides answers to these and to many other momentous matters of Private Law of Contract. Reconstructed from the detailed analysis of the theory and legal practice, the notion of normative contract as an agreement of cooperative nature could constitute the bridge to a new and inspiring way of conceiving the contract. Not surprisingly, as shown by its main practical manifestations, the contract is often more than just an instrument to organize an exchange of goods and services, a powerful regulatory tool of reality and human behavior. To put it briefly, if on the one hand in this essay the author seeks find a remedy for a situation of great uncertainty regarding the so-called normative contract, in the other hand he also invites the legal community to reflect calmly on the role played by contract in present society.Keywords: Normative contract, Normenvertrag, Alfred HUECK, genesis, concept, pactum de modo contrahendo, contrat-cadre, framework agreements, distribution, collective agreement, financial transactions, joint venture, marriage contract, codes of conduct, Spanish private law, French private law, contractual clause, cooperative agreement, intuitus personae, no-obligational and obligational content of the contract, union of contracts, regulatory function of contract, general contract theory, theory of legal regulation, Hans KELSEN , freedom of contract