Dissertations / Theses on the topic 'Déploiement de systèmes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Déploiement de systèmes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Boujbel, Raja. "Déploiement de systèmes répartis multi-échelles : processus, langage et outils intergiciels." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30016/document.
Due to increased connected objects, multiscale systems are more and more widespread. Those systems are highly distributed, heterogeneous, dynamic and open. They can be composed of hundreds of software components deployed into thousands of devices. Deployment of software systems is a complex post-production process that consists in making software available for use and then keeping it operational. For multiscale systems, deployment plan expression just as deployment realization and management are tasks impossible for a human stakeholder because of heterogeneity, dynamics, number, and also because the deployment domain is not necessarily known in advance. The purpose of this thesis is to study and propose solutions for the deployment of distributed multiscale software systems. Firstly, we provide an up-to-date terminology and definitions related to software deployment, plus a state of the art on automatic deployment of distributed software systems. The rest of the contribution lies in the proposition of: a complete process for autonomic deployment of multiscale systems ; a domain specific language, MuScADeL, which simplifies the deployment conceptor task and allows the expression of deployment properties such as informations for the domain state probing ; and a middleware, MuScADeM, which insures the automatic generation of a deployment plan according the domain state, its realization and finally the maintenance in an operational condition of the system
Chalfoun, Imad. "Conception et déploiement des Systèmes de Production Reconfigurables et Agiles (SPRA)." Thesis, Clermont-Ferrand 2, 2014. http://www.theses.fr/2014CLF22488/document.
Industry is, today as it has always been, a cornerstone of the economy for any developed country. Having a strong manufacturing base is very important because it impels and stimulates all the other sectors of the economy. It provides a wide variety of job, which bring higher standards of living to many sectors of society, and builds a strong middle class. Increasing global competition, rapid changes in the marketplace and the need to create stable companies with profitable plants require the implementation of a global approach, taking into account technical, economic, logistic and societal aspects in the design of an innovative manufacturing system. The aim of this dissertation is to contribute to the development of an innovative concept of Reconfigurable and Agile Manufacturing Systems (RAMS) to adapt quickly and effectively to the requirements imposed by markets, customers, technology processes, the environment and society, to ensure that the enterprise is dynamic, competitive and profitable. In this thesis work, the characterization and proposal of a generic model for this new type of manufacturing system have been described using the language of complex systems modeling (SysML: Systems Modeling Language). We have developed a reconfiguration process that represents the approach to follow in the design and implementation of a new configuration. In addition, the operational control of a RAMS has been introduced. Finally, some works developed in this thesis have been partially deployed on an industrial demonstrator within the AIP-PRIMECA Auvergne organisation
Agba, Landaabalo. "Elaboration de logiciel d'aide au déploiement de réseaux sans fil millimétriques." Limoges, 2004. http://aurore.unilim.fr/theses/nxfile/default/4e4f4064-e256-4878-aa69-3c7844b0f2ae/blobholder:0/2004LIMO0020.pdf.
The deployment of wireless networks in an outdoor environment is complex because of the numerous parameters which must be taken into account. In this context, this report presents a relevant planning software for networks deployment which integrates these multiple parameters in millimetric frequency band. Rays Tracing method is used in association with antennae characteristics and propagation channel parameters. The coverage simulations on real cases are realized using GIS (Geographic Information system) databases coupled with aerial view photographs and GPS (Global Positioning System) measurements. The precision of the simulations was successfully confirmed by experimental measurements. This software allowed to propose some coverage improvements of a 40 GHz LMDS (Local Multipoint Distribution Services) system using new antennae topologies, reflectors and repeaters
Ricordel, Pierre-Michel. "Programmation orientée multi-agents : développement et déploiement de systèmes multi-agents voyelles." Grenoble INPG, 2001. http://www.theses.fr/2001INPG0096.
Dubus, Jérémy. "Une démarche orientée modèle pour le déploiement de systèmes en environnements ouverts distribués." Phd thesis, Université des Sciences et Technologie de Lille - Lille I, 2008. http://tel.archives-ouvertes.fr/tel-00668936.
Daix, Boris. "Abstraction des systèmes informatiques à haute performance pour l'automatisation du déploiement d'applications dynamiques." Rennes 1, 2009. http://www.theses.fr/2009REN1S156.
Computing is an important lever in human development, however using high performance systems remains complex. Indeed, allocating some resources for an application, installing it on the allocated resources, and executing it is a difficult process. Automating this process, called deployment, allows to better separate the concerns of the system users, of the application developers, and of the infrastructure administrators while aiming at better performances for the applications. Based on a multi-level abstraction model, the contribution of this thesis is an automatic deployment architecture able to honor the compatibility and feasibility constraints, inhere in the deployment, for resources and applications parallel and distributed, heterogeneous, and dynamic such as computing clusters or grids and parametric, parallel, or workflow applications
Krichen, Mariem. "Modèle technico-économique pour le déploiement d'un réseau femto avec le partage de ressources." Versailles-St Quentin en Yvelines, 2014. http://www.theses.fr/2014VERS0011.
Nowadays, the mobile operators want to offer a correct quality of service to their clients while they are in the heart of a catastrophic scenario with data request doubling from one year to another, networks reaching their capacity limits and stable revenues due to flat rate. The solution that we propose in this thesis is the exploitation of femto accesses, set up at clients place, through sharing resources. Since many types of cells should be managed with the introduction of femto cells, self-configuration mechanisms would be vital for mobile operators. The first part of this thesis compares the performances of three algorithms for the self-confi guration of the physical cell identifier in LTE. In the second part of the thesis, we present a techno-economic model where two types of actors interact. First, the femto access providers are the mobile operator clients who own femto access at their place and accept to share part of their bandwidth with other clients. Then, the femto access requesters are the mobile operator clients who need a good quality of service outdoor. In sharing femto access problem, requesters are competing to access providers resources. This competition is modeled as a game where requesters rely on a learning mechanism to address their requests. Through simulations, we evaluate the performances of this mechanism for different network loads and scenarios where competition between requesters differs. Finally, this mechanism is implemented on a static context then on a dynamic one. We propose a solution to mobility issues based on cells categorization
Foucher, Clément. "Méthodologie de conception pour la virtualisation et le déploiement d'applications parallèles sur plateforme reconfigurable matériellement." Phd thesis, Université Nice Sophia Antipolis, 2012. http://tel.archives-ouvertes.fr/tel-00777511.
Trampont, Mathieu. "Modélisation et optimisation du déploiement des réseaux de télécommunications : applications aux réseaux d'accès cuivres et optiques." Paris, CNAM, 2009. http://www.theses.fr/2009CNAM0667.
This dissertation presents works on telecommunication access networks optimization. The access network gather the traffic of clients in an area, before transmitting it to the core network. It is a hierarchical network with a central concentrator at the top, the clients at the bottom, and one or two layers of equipements. We focus on two applications : the optimization of the access of the telephone telecommunication network on a new territory, and the optimization of the installation of an optical access network while taking into account an existing infrastructure. For the first application, we propose to improve existing methods and we propose new ones in order to obtain good solutions for different kinds of instances. For the optical network, the problem is to connect the clients to the central concentrator using 2 or 3 layers of optical splitters. The objective is to minimize the global installation cost. We propose new models for the location of splitters and for the choice of cables. Some tests show that good solutions can be obtained on real instances for the location of splitters
Zalila, Bechir. "Configuration et déploiement d'applications temps-réel réparties embarquées à l'aide d'un langage de description d'architecture." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00004314.
Mzid, Rania. "Rétro-ingénierie des plateformes pour le déploiement des applications temps-réel." Thesis, Brest, 2014. http://www.theses.fr/2014BRES0065/document.
The main purpose of this Phd is to contribute to the software development of real-time embedded systems. We define in this work a methodology named DRIM: Design Refinement toward Implementation Methodology. This methodology aims to guide the deployment of a real-time application on to different RTOS while respecting MDE principals and ensuing that the timing properties are still met after deployment. The automation of DRIM shows its ability to detect non-implementable design models describing the real-time application, on aparticular RTOS, which permits to reduce the time-to-market on the one hand and guide the user to the selection of the appropriate RTOS from the other hand
Plusquellec, Titouan. "Cadre de déploiement de la méthode de Conception-Construction." Master's thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/28227.
The construction industry represents a major sector for the Quebec Province, subject to constant technological advances as well as social and environmental pressure. It is in line with this dynamic that many companies are currently looking for answers to the performance problems of the traditional delivery system, highlighted by the drop in activity of recent years. In this context, this research focuses on the development of a framework for the Design-Build delivery system. This system aims at integrating both design and construction competences in a single entity responsible for the entire completion of the project. In particular, the project introduces a decision support tool that may help the user to determine if a project is adapted to the use of the Design-Build delivery system, taking into account the project characteristics as well the companies involved. To develop such a tool, the Design-Build delivery system was first compared to the traditional Design-Bid-Build system in terms of cost performance, schedule and quality, to determine its positive and negative aspects. The impact of the method on the different stakeholders of the project was then considered in order to identify the requirements of such an organization on the actors of the project. A series of interviews allowed to validate the previous results while providing further details on the particularities of the Quebec situation, which led to the development of the framework for the application of the method. This framework has finally been translated into a decision support tool to facilitate its use.
Bissay, Aurélie. "Du déploiement d’un système PLM vers une intégration des connaissances." Thesis, Lyon 2, 2010. http://www.theses.fr/2010LYO20003/document.
PLM (Product Lifecycle Management) Systems allow traceability of information and facilitate the reduction of products development cycle. Besides the aspect related to information management, they aim at bringing together all technical data needed to develop new products and also they contribute to improve business processes. Our PhD work define a methodology of PLM system deployment that incorporates the knowledge capitalization dimension. Based on a business processes formalization, elements of knowledge are extracted and used to enrich the data model. This model revolves around two axes: an "information" axis and a "knowledge"axis. Each axis is devided into four steps: identify, model, use and evaluate. The identification stage is to define the data model of the system and activities requiring specific business knowledge. The modeling phase is to configure the system to integrate the defined model in the PLM system but also to formalize extracted tacit knowledge. Then comes the user through the use of the system. Finally, we propose to evaluate the system from product, process and organization modeling but also from generated knowledge within the system. The case study of a process of bidding for the Marmillon SAS company which is a subcontractor in the field of plastics, specialist of injection and extrusion processes for automotive parts allow to validate our approach
Sylla, Adja Ndeye. "Support intergiciel pour la conception et le déploiement adaptatifs fiables, application aux bâtiments intelligents." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM095/document.
In the context of pervasive computing and internet of things, systems are heterogeneous,distributed and adaptive (e.g., transport management systems, building automation). Thedesign and the deployment of these systems are made difficult by their heterogeneous anddistributed nature but also by the risk of conflicting adaptation decisions and inconsistenciesat runtime. Inconsistencies are caused by hardware failures or communication errors. Theyoccur when actions corresponding to the adaptation decisions are assumed to be performedbut are not done.This thesis proposes a middleware support, called SICODAF, for the design and thedeployment of reliable adaptive systems. SICODAF combines a behavioral reliability (absenceof conflicting decisions) by means of transitions systems and an execution reliability(absence of inconsistencies) through a transactional middleware. SICODAF is based on autonomiccomputing. It allows to design and deploy an adaptive system in the form of anautonomic loop which consists of an abstraction layer, a transactional execution mechanismand a controller. SICODAF supports three types of controllers (based on rules, on continuousor discrete control theory). SICODAF also allows for loop reconfiguration, to dealwith changing objectives in the considered system, and the integration of a hardware failuredetection system. Finally, SICODAF allows for the design of multiple loops for systems thatconsist of a high number of entities or that require controllers of different types. These loopscan be combined in parallel, coordinated or hierarchical.SICODAF was implemented using the transactional middleware LINC, the abstractionenvironment PUTUTU and the language Heptagon/BZR that is based on transitionssystems. SICODAF was also evaluated using three case studies
Laure, Pichot. "Stratégie de déploiement d'outils de pilotage de chaines logistiques : Apport de la classification." Phd thesis, INSA de Lyon, 2006. http://tel.archives-ouvertes.fr/tel-00159155.
Le modèle SCOR-model est une base de référence de processus standard qui a été utilisée pour le déploiement du Supply Chain Management. Il a notamment servi de base pour la description des processus et pour la détermination des variables quantitatives et qualitatives utilisables dans la classification d'objets autour du thème des chaînes logistiques.
Sur le cas de Rhodia (multinationale produisant plusieurs dizaines de milliers de produits avec plus d'une centaine de sites sur quatre continents), nous avons appliqué différentes méthodes de classification afin d'accélérer et de faciliter le déploiement du Supply Chain Management.
Parmi ces outils, nous avons utilisé les arbres de décision pour établir des classes de produits relativement à leur méthode de gestion et la méthode des nuées dynamiques pour définir des classes d'entreprises relativement à leurs caractéristiques propres à la gestion de la chaîne logistique.
Ces classifications ont servi de base au déploiement des logiques de pilotage et de SAP sur l'ensemble des entreprises du groupe.
A posteriori, nous pouvons constater le gain de temps qu'elles ont occasionné en permettant d'offrir un éventail de solutions prédéterminées, adaptables à chaque entreprise du groupe.
Le fait d'avoir réussi un développement du concept de gestion des chaînes logistiques et l'implantation de SAP sur un groupe de cette taille en un temps si court est en soit une validation de l'approche.
Borges, Da Silva Filho Alvim. "Le déploiement des systèmes logistiques de distribution du gaz naturel : une analyse financière et stratégique par les options réelles du système GNC." Thesis, Aix-Marseille 2, 2010. http://www.theses.fr/2010AIX24008.
The thesis is structured in five chapters. The first chapter brings to light the current context of the market of the energy and the GN which the research concerns. The history of the market of the GN is presented by focusing the distribution, where the new rules promulgated for the whole market of the energy, created a new competitive environment.This one is the result of the change of structure of the sector, go from a public monopoly to the private competition. We show the more successful need of management tools, such as the real options.Also, we can see that the flexible systems of distribution become an asset important for the deployment of a distribution network. The second chapter presents the general structure of the empirical research. It discusses the epistemology of the research and the abductive approach which is used there. This last one, based on Thiétart ( 2001 ), allows that the research can advance with the interactions enter the ground of research And the theory in a simultaneous way. We also show that the systematic methodological approach (Grawitz,2001) is the one which adapts itself best to the research.The third chapter exposes the frame of analysis of the research. It exploits the important aspects of the approach by the real options for the analysis of the system of distribution of GN. The objective here is to show the state of the research on the real options and the contributions which the optional approach can offer to the management of the distribution of the GN
Piette, Ferdinand. "Intergiciel agent pour le déploiement et la configuration d'applications distribuées dans des environnements ambiants." Electronic Thesis or Diss., Paris 6, 2017. http://www.theses.fr/2017PA066058.
Research domains like Ambient Intelligence or Internet of Things came up in the early 2000’s with the technologic improvement and the ongoing miniaturization of electronic devices. These electronic and information devices are scattered in the user’s environment, can communicate and exchange data more and more easily to provide intelligent and non-intrusive services to the users. However, it is difficult to have generic implementations of these applications. These difficulties are due the the high heterogeneity and dynamicity of the ambient environments. Vertical integrations of connected devices (data exchanges from the devices to external servers) allow more interoperability but generate overloads of the communication channels and privacy concerns. To prevent these problems, horizontal approaches (connected devices communicate directly together through the hardware infrastructure) have to be encouraged. In this thesis work, we address the problem of the automatic deployment and configuration of distributed applications in these ambient environments. We propose mechanisms that allow, from a description of the environment, the selection and the configuraion of the hardware entities that will support the execution of applications. These mechanisms are encapsulated in a middleware based on the multi-agent paradigm. The different agents of the system cooperate in order to select the right hardware entities that respects the requirements and the constraints of the applications we want to deploy
Pouillon, Nicolas. "Modèle de programmation pour applications parallèles multitâches et outil de déploiement sur architecture multicore à mémoire partagée." Paris 6, 2011. http://www.theses.fr/2011PA066389.
Faye, Maurice-Djibril. "Déploiement auto-adaptatif d'intergiciel sur plate-forme élastique." Thesis, Lyon, École normale supérieure, 2015. http://www.theses.fr/2015ENSL1036/document.
We have studied the means to make a middleware deployment self-adaptive. Our use case middleware is hierarchical and distributed and can be modeled by a graph. A vertex models a process and an edge models a communication link between two processes. The middleware provides high performance computing services to the users.Once the middleware is deployed on a computing infrastructure like a grid or cloud, how it adapt the changes in dynamic environment? If the deployment is static, it may be necessary to redo all the deployment process, which is a costly operation. A better solution would be to make the deployment self-adaptive. We have proposed a rules-based self-stabilizing algorithm to manage a faulty deployment. Thus, after the detection of an unstable deployment, caused by some transients faults (joining of new nodes or deletion of existing nodes which may modify the deployment topology), the system will eventually recover a stable state, without external help, but only by executing the algorithm.We have designed an ad hoc discrete events simulator to evaluate the proposed algorithm. The simulation results show that, a deployment, subjected to transients faults which make it unstable, adapts itself. Before the simulator design, we had proposed a model to describe a distributed infrastructure, a model to describe hierarchical middleware and a model to describe a deployment, that is the mapping between the middleware processes and the hardware on which they are running on
Etchevers, Xavier. "Déploiement d'applications patrimoniales en environnements de type informatique dans le nuage." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00875559.
Boutonnet, Arnaud. "Déploiement optimal contraint et robuste de satellites volant en formation invariante." Toulouse, ENSAE, 2003. http://www.theses.fr/2003ESAE0021.
Génevé, Lionel. "Système de déploiement d'un robot mobile autonome basé sur des balises." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAD024/document.
This thesis is part of a project which aims at developing an autonomous mobile robot able to perform specific tasks in a preset area. To ease the setup of the system, radio-frequency beacons providing range measurements with respect to the robot are set up beforehand on the borders of the robot’s workspace. The system deployment consists in two steps, one for learning the environment, then a second, where the robot executes its tasks autonomously. These two steps require to solve the localization and simultaneous localization and mapping problems for which several solutions are proposed and tested in simulation and on real datasets. Moreover, to ease the setup and improve the system performances, a beacon placement algorithm is presented and tested in simulation in order to validate in particular the improvement of the localization performances
Marchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus." Electronic Thesis or Diss., Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049.
Internet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are no longer suitable for the massive distribution of content that is now being made. New content-based network protocols (Information-Centric Networking) are currently being designed to optimize these exchanges by betting on a paradigm shift where content, rather than machines, are addressable across the Internet. However, such a change can only be made gradually and if all operational imperatives are met. Thus, this thesis aims to study and remove the main tech-nological obstacles preventing the adoption of the NDN (Name Data Networking) protocol by operators by guaranteeing the security, performance, interoperability, proper management and automated deployment of an NDN network. First, we evaluate the current performance of an NDN network thanks to a tool we made, named ndnperf, and observe the high cost for a provider delivering fresh content using this protocol. Then, we propose some optimizations to improve the efficiency of packet generation up to 6.4 times better than the default parameters. Afterwards, we focus on the security of the NDN protocol with the evaluation of the content poisoning attack, known as the second more critical attack on NDN, but never truly characterized. Our study is based on two scenarios, with the usage of a malicious user and content provider, or by exploiting a flaw we found in the packet processing flow of the NDN router. Thus, we show the danger of this kind of attacks and propose a software fix to prevent the most critical scenario. Thirdly, we are trying to adapt the HTTP protocol in a way so that it can be transported on an NDN network for interoperability purposes. To do this, we designed an adaptation protocol and developed two gateways that perform the necessary conversions so that web content can seamlessly enter or exit an NDN network. After describing our solution, we evaluate and improve it in order to make web content benefit from a major NDN feature, the in-network caching, and show up to 61.3% cache-hit ratio in synthetic tests and 25.1% in average for browsing simulations with multiple users using a Zipf law of parameter 1.5. Finally, we propose a virtualized and orchestrated microservice architecture for the deploy-ment of an NDN network following the Network Fonction Virtualization (NFV) paradigm. We developed seven microservices that represent either an atomic function of the NDN router or a new one for specific purposes. These functions can then be chained to constitute a full-fledged network. Our architecture is orchestrated with the help of a manager that allows it to take the full advantages of the microservices like scaling the bottleneck functions or dynamically change the topology for the current needs (an attack for example). Our architecture, associated with our other contributions on performance, security and in-teroperability, allows a better and more realistic deployment of NDN, especially with an easier development of new features, a network running on standard hardware, and the flexibility allowed by this kind of architecture
Le, Saux Cédric. "Modélisation numérique du pliage et du déploiement de systèmes spatiaux avec prise en compte des contacts et des frottements : cas des systèmes de tenségrité." Montpellier 2, 2002. http://www.theses.fr/2002MON20152.
Kamni, Soulimane. "Un framework d’aide au déploiement et à la personnalisation des systèmes temps réel : application aux autopilotes de drones." Electronic Thesis or Diss., Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2023. http://www.theses.fr/2023ESMA0014.
This thesis focuses on the design of real-time critical embedded systems. It concentrates more specifically on the crucial deployment phase, where system functions are allocated to software tasks.The thesis begins with an in-depth presentation of the context of real-time embedded systems, their specificities and their software life cycle. Then, the field of real-time scheduling is introduced, detailing task models, scheduling algorithms and timing validation tests. On these foundations, two original contributions are proposed to facilitate deployment in a context where information on the temporal behavior of functions remains limited. The first is the RYM method, a single-processor pre-deployment technique based on activation rhythms. A software tool is also developed to validate this approach. The second contribution is a framework to extract, model and analyze the internal architecture of open-source drone autopilots from the source code. This framework is applied to adapt an advanced scheduling technique to the Paparazzi autopilot. These two contributions provide answers to the difficult problem of deploying critical embedded systems with partial information. They are both based on open prototyping developments based on model-driven engineering, allowing rapid adaptation to other analysis tools
Darwish, Molham. "Architecture et déploiement de services d'aide à la personne." Thesis, Lorient, 2016. http://www.theses.fr/2016LORIS411/document.
The ageing of the European population encouraged the community to search for solutions tosupport this evolution. In this context, several issues (related to the expensive and limited healthcare services and health facilities capacities) need to be addressed.Thus, several projects, research and industrial solutions have been proposed to address these issues.Most of these projects and industrial developments are based on the use of the latest ICT technicaldevelopments to provide solutions that ameliorate the well-being of the targeted ageing groupand to guaranty their independence in their own living spaces. The provided technologicalsolutions need to be guaranteed against potential faults which may lead to the systems failure andimpact the users’ needs and independency.In this work, we propose a home automation system representation, based on the user’s needs toprovide continuous and viable solutions that meets the users’ expectations, and ensuring theavailability of system’s services.For this goal, we propose to develop an integrated modeling framework allowing therepresentation of the home automation reconfigurable system with the consideration of a faulttolerance approach (based on the alternative definition of scenarios of system servicesdeliverance).In the proposed workflow, we describe the system structural elements (described as services andcomponents) in the design modeling view, and, we lead model transformation rules allowinggenerating an analysis model and a behavior model. The analysis model allows making a decisionabout the alternative elements selection in order to substitute the faulty elements. The analysismodel definition is based on the notion of Fault Tree Analysis approach (adopting the probabilityof events failure in order to evaluate a given system status).The behavior model is in charge of simulating the execution of the system services ensuring, thus,that the proposed scenarios lead to system services deliverance.Moreover, we propose to define an expert based feature measuring the importance of a system’scomponent within the service context. In this framework, we propose a new approach, based onthe joint integration of the importance factor into the Fault Tree Analysis approach in order to studythe criticality of the component, in case of failure, on the service continuity.We propose an experimental validation framework, based on several validation objectives toevaluate the proposed work in this research
Gomez, Pascal. "Outils pour le déploiement d'applications avec des contraintes du temps réel sur des multiprocesseurs sur puces." Paris 6, 2006. http://www.theses.fr/2006PA066114.
Heusch, Michael. "Modélisation et résolution d'une application d'aide au déploiement d'antennes radio en programmation par contraintes sur le discret et le continu." Nantes, 2006. http://www.theses.fr/2006NANT2003.
Since the mid 90's constraint programming has proved successful in solving complex combinatorial applications. Its extension to interval constraints is a promising approach to handle non-linear constraints. However, the solving of discrete-continuous hybrid systems has remained mostly unexplored. This thesis takes advantage of a hybrid model to tackle an application while avoiding the discretization of this problem. Two main issues are adressed : 1. Continuous global constraints: the introduction of global constraints has substantially enhanced the expressiveness and efficiency of discrete constraint solvers. We specify a continuous global constraint in a continuous solver. It maintains Euclidean distance constraints between n points by means of a geometric algorithm. 2. Solving of a discrete-continuous hybrid application: deployment support of radio antennas is a crossbreeding between a radio link frequency assignment problem and a location analysis problem. Our Euclidean distance global constraint enables us to obtain an efficient discrete-continuous hybrid resolution of this problem
Etchevers, Xavier. "Déploiement d’applications patrimoniales en environnements de type informatique dans le nuage." Thesis, Grenoble, 2012. http://www.theses.fr/2012GRENM100/document.
Cloud computing aims to cut down on the outlay and operational expenses involved in setting up and running applications. To do this, an application is split into a set of virtualized hardware and software resources. This virtualized application can be autonomously managed, making it responsive to the dynamic changes affecting its running environment. This is referred to as Application Life-cycle Management (ALM). In cloud computing, ALM is a growing but immature market, with many offers claiming to significantly improve productivity. However, all these solutions are faced with a major restriction: the duality between the level of autonomy they offer and the type of applications they can handle. To address this, this thesis focuses on managing the initial deployment of an application to demonstrate that the duality is artificial. The main contributions of this work are presented in a platform named VAMP (Virtual Applications Management Platform). VAMP can deploy any legacy application distributed in the cloud, in an autonomous, generic and reliable way. It consists of: • a component-based model to describe the elements making up an application and their projection on the running infrastructure, as well as the dependencies binding them in the applicative architecture; • an asynchronous, distributed and reliable protocol for self-configuration and self-activation of the application; • mechanisms ensuring the reliability of the VAMP system itself. Beyond implementing the solution, the most critical aspects of running VAMP have been formally verified using model checking tools. A validation step was also used to demonstrate the genericity of the proposal through various real-life implementations
Hammami, Emir. "Déploiement sensible au contexte et reconfiguration des applications dans les sessions collaboratives." Phd thesis, Université Paul Sabatier - Toulouse III, 2007. http://tel.archives-ouvertes.fr/tel-00206285.
Zhao, Yimeng. "Déploiement du switch logiciel dans SDN-enabled Réseau environnement de virtualisation." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0029.
Due to the growing trend of “Softwarization”, virtualization is becoming the dominating technology in data center and cloud environment. Software Defined Network (SDN) and Network Function Virtualization (NFV) are different expressions of “Network Softwarization”. Software switch is exactly the suitable and powerful tool to support network softwarization, which is also indispensable to the success of network virtualization. Regarding the challenges and opportunities in network softwarization, this thesis aims to investigate the deployment of software switch in a SDN-enabled network virtualization environment
Piette, Ferdinand. "Intergiciel agent pour le déploiement et la configuration d'applications distribuées dans des environnements ambiants." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066058/document.
Research domains like Ambient Intelligence or Internet of Things came up in the early 2000’s with the technologic improvement and the ongoing miniaturization of electronic devices. These electronic and information devices are scattered in the user’s environment, can communicate and exchange data more and more easily to provide intelligent and non-intrusive services to the users. However, it is difficult to have generic implementations of these applications. These difficulties are due the the high heterogeneity and dynamicity of the ambient environments. Vertical integrations of connected devices (data exchanges from the devices to external servers) allow more interoperability but generate overloads of the communication channels and privacy concerns. To prevent these problems, horizontal approaches (connected devices communicate directly together through the hardware infrastructure) have to be encouraged. In this thesis work, we address the problem of the automatic deployment and configuration of distributed applications in these ambient environments. We propose mechanisms that allow, from a description of the environment, the selection and the configuraion of the hardware entities that will support the execution of applications. These mechanisms are encapsulated in a middleware based on the multi-agent paradigm. The different agents of the system cooperate in order to select the right hardware entities that respects the requirements and the constraints of the applications we want to deploy
Plainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0023.
Relaying has been proposed as an efficient solution to increase transmission reliability by providing spatial diversity, and to increase transmission efficiency. Among the wide variety of existing relaying protocols proposed for the relay channel, we are interested in the Dynamic Decode and Forward (DDF) protocol as it outperforms all previously defined forwarding strategies in terms of Diversity Multiplexing Tradeoff. When using the DDF protocol, the relay assits the transmission only if it correctly decodes the sent message before the destination. We propose a practical implementation of this DDF protocol based on channel coding for hybrid automatic repeat request.Then, we define and study two relaying schemes for the relay channel that can be used when the source is relay-unaware: the Monostream scheme and the Distributed Alamouti scheme. The performance of these proposed relaying schemes for the DDF protocol are derived for open-loop and closed-loop transmissions. After defining the macro diversity order achieved by a transmission, we derived upper bounds on the achievable macro and micro diversity orders of these DDF protocols when the transmitting nodes use finite symbol alphabet. We proposed a so-called Patching technique in order to increase this achievable macro diversity order still guaranteeing that the source is relay-unaware. This Patching technique aims at increasing the number of bits transmitted by the relay up to the number of information bits in the message. This technique is also combined with Space Time Block Codes in order to improve both the achievable macro and micro diversity orders. This Patching technique has also been applied over the Interference Relay Channel where we introduce the use of a precoded DDF protocol at a relay shared by several source/destination pairs. We use the Patching technique in order to increase the achieved performance. The gain resulting from the use of these various derivations of the DDF protocol are finally observed at the system level for two scenarios: a macro cellular network over urban area and an indoor network, combined with two applications: a unicast transmission, e.g., web browsing, and a broadcasting transmission, e.g., video broadcasting. The results show that the Monostream relaying scheme for the DDF protocol provides good performance while allowing both the source and the destination to be relay-unaware. Consequently, the Monostream DDF is a promising protocol for the deployment of plug-and-play relays in wireless systems
Ahmed, Nacer Amina. "Contributions au déploiement sécurisé de processus métiers dans le cloud." Electronic Thesis or Diss., Université de Lorraine, 2019. http://www.theses.fr/2019LORR0013.
The fast evolution and development of technologies lead companies to grow faster in order to remain competitive and to offer services which are at the cutting edge of technology, meeting today’s market needs. Indeed, companies that are subject to frequent changes require a high level of flexibility and agility. Business Process Management (BPM) allows them to better manage their processes. Moreover, the emergence of Cloud Computing and all its advantages (flexibility and sharing, optimized cost, guaranteed accessibility... etc) make it particularly attractive. Thus, the combination of these two concepts allows companies to refloat their capital. However, the use of the cloud also implies new requirements in term of security, which stem from its shared environment, and which slow down its widespread adoption. The objective of this thesis consists in proposing concepts and tools that help and guide companies to deploy safely their processes in a cloud environment. A first contribution is an obfuscation algorithm that automates the decomposition and deployment of processes without any human intervention, based on the nature of the fragments. This algorithm limits the rate of information on each cloud through a set of separation constraints, which allow to deploy fragments considered as sensitive on different clouds. The second contribution of this thesis consists in complicating the structure of the process in order to limit the risk of clouds coalition. This is done through the introduction of fake fragments at certain strategic points in the process. The goal is to make generated collaborations more resistant to attacks, and thus reducing the likelihood of coalition. Even if obfuscation and complexification operations protect companies’ know-how during a cloud deployment, a risk remains. In this context, this thesis also proposes a risk model for evaluating and quantifying the security risks to which the process remain exposed after deployment. The purpose of this model is to combine security information with other dimensions of quality of service such as cost, for the selection of optimized configurations. The proposed approaches are implemented and tested through different process configurations. Their validity is verified through a set of metrics, whose objective is to measure the complexity of the processes as well as the remaining risk level after obfuscation
Merle, Noëlle. "Architecture pour les systèmes de déploiement logiciel à grande échelle : prise en compte des concepts d'entreprise et de stratégie." Université Joseph Fourier (Grenoble), 2005. http://www.theses.fr/2005GRE10259.
Deployment comes at the end of software lifecycle. This step is more and more important in enterprises managing a lot of machines : we speak about large scale deployment. Enterprises wants to automate this step, in order to not repeat the same steps several times. However they wishes to keep control on deployment activities, forcing different constraints (same version of an application on a group of machines, preference for applications with fixed characteristics, specific scheduling,. . . ). In our work, we define a deployment metamodel, allowing to automate the processing of deployment data. We also define deployment strategies which allow enterprises to define their own deployment constraints, according to their needs and preferences
Khalgui, Mohamed. "Validation temporelle et déploiement d'une application de contrôle industrielle à base de composants." Thesis, Vandoeuvre-les-Nancy, INPL, 2007. http://www.theses.fr/2007INPL009N/document.
This thesis deals with the temporal validation and the deployment of component-based industrial control applications. We are interested in the Function Blocks approach, defined in the IEC 61499 standard, as a well known component based technology in the industry. A Function Block is an event triggered component owning data to support the application functionalities. The advantage of this technology is the taking into account of the application and also its execution support. The first thesis contribution deals with the interpretation of the different concepts defined in the standard. In particular, we propose a policy defining a deterministic behavior of a FB. To apply an exhaustive temporal validation of the application, we propose a behavioral model of a Block as Timed Automata. On the other hand, we propose a semantic for the concept of FBs networks to develop industrial control applications. The second thesis contribution deals with the deployment of FBs networks in a distributed multi-tasking architecture. Such deployment has to respect classical End to End Response Time Bounds as temporal constraints. To validate the temporal behavior of an application, we propose an approach transforming its blocks into an actions system with precedence constraints. The purpose is to exploit previous theories on the scheduling of real-time systems. To deploy FBs networks in feasible OS tasks, we propose a Hybrid scheduling approach combining an off-line non-preemptive scheduling and an on-line preemptive one. The off-line scheduling allows to construct OS tasks from FBs, whereas the on-line one allows to schedule these tasks according to the classical EDF policy. A constructed OS task is an actions sequence defining an execution scenario of the application. Thanks to this approach, we reduce the context switching at run-time by merging application actions in OS tasks. In addition, the system feasibility is increased by applying an on-line preemptive policy. Finally, the last thesis contribution is an extension of the previous one. We propose an approach allocating FBs networks in a distributed architecture. Based on a heuristic, such approach uses the hybrid method to construct feasible OS tasks in calculators. The allocation problem of a particular application FB is to look for a corresponding calculator while respecting functional, temporal and execution support constraints. We note that the proposed heuristic is based on a back-tracking technic to increase the solutions space
Marchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.
Internet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are no longer suitable for the massive distribution of content that is now being made. New content-based network protocols (Information-Centric Networking) are currently being designed to optimize these exchanges by betting on a paradigm shift where content, rather than machines, are addressable across the Internet. However, such a change can only be made gradually and if all operational imperatives are met. Thus, this thesis aims to study and remove the main tech-nological obstacles preventing the adoption of the NDN (Name Data Networking) protocol by operators by guaranteeing the security, performance, interoperability, proper management and automated deployment of an NDN network. First, we evaluate the current performance of an NDN network thanks to a tool we made, named ndnperf, and observe the high cost for a provider delivering fresh content using this protocol. Then, we propose some optimizations to improve the efficiency of packet generation up to 6.4 times better than the default parameters. Afterwards, we focus on the security of the NDN protocol with the evaluation of the content poisoning attack, known as the second more critical attack on NDN, but never truly characterized. Our study is based on two scenarios, with the usage of a malicious user and content provider, or by exploiting a flaw we found in the packet processing flow of the NDN router. Thus, we show the danger of this kind of attacks and propose a software fix to prevent the most critical scenario. Thirdly, we are trying to adapt the HTTP protocol in a way so that it can be transported on an NDN network for interoperability purposes. To do this, we designed an adaptation protocol and developed two gateways that perform the necessary conversions so that web content can seamlessly enter or exit an NDN network. After describing our solution, we evaluate and improve it in order to make web content benefit from a major NDN feature, the in-network caching, and show up to 61.3% cache-hit ratio in synthetic tests and 25.1% in average for browsing simulations with multiple users using a Zipf law of parameter 1.5. Finally, we propose a virtualized and orchestrated microservice architecture for the deploy-ment of an NDN network following the Network Fonction Virtualization (NFV) paradigm. We developed seven microservices that represent either an atomic function of the NDN router or a new one for specific purposes. These functions can then be chained to constitute a full-fledged network. Our architecture is orchestrated with the help of a manager that allows it to take the full advantages of the microservices like scaling the bottleneck functions or dynamically change the topology for the current needs (an attack for example). Our architecture, associated with our other contributions on performance, security and in-teroperability, allows a better and more realistic deployment of NDN, especially with an easier development of new features, a network running on standard hardware, and the flexibility allowed by this kind of architecture
Cudennec, Loïc. "CoRDAGe : un service générique de co-déploiement et redéploiement d’applications sur grilles." Phd thesis, Rennes 1, 2009. ftp://ftp.irisa.fr/techreports/theses/2009/cudennec.pdf.
Computer grids are made of thousands of heterogeneous physical resources that belong to different administration domains. This makes the use of the grid very complex, especially for deploying distributed applications at large scale, while taking care of the dynamicity of the infrastructure. The contribution of the PhD Thesis is to propose a model that allows to dynamically and transparently deploy distributed applications. This model can be adapted, in a non-intrusive way, to handle different kind of applications. In order to validate our model, we propose an architecture named CoRDAGe. This leads to a prototype that can handle several applications, such as the JuxMem data-sharing service and the Gfarm distributed file system. Experimentations have been conducted within the Grid'5000 project
Khalgui, Mohamed. "Validation temporelle et déploiement d'une application de contrôle industrielle à base de composants." Electronic Thesis or Diss., Vandoeuvre-les-Nancy, INPL, 2007. http://www.theses.fr/2007INPL009N.
This thesis deals with the temporal validation and the deployment of component-based industrial control applications. We are interested in the Function Blocks approach, defined in the IEC 61499 standard, as a well known component based technology in the industry. A Function Block is an event triggered component owning data to support the application functionalities. The advantage of this technology is the taking into account of the application and also its execution support. The first thesis contribution deals with the interpretation of the different concepts defined in the standard. In particular, we propose a policy defining a deterministic behavior of a FB. To apply an exhaustive temporal validation of the application, we propose a behavioral model of a Block as Timed Automata. On the other hand, we propose a semantic for the concept of FBs networks to develop industrial control applications. The second thesis contribution deals with the deployment of FBs networks in a distributed multi-tasking architecture. Such deployment has to respect classical End to End Response Time Bounds as temporal constraints. To validate the temporal behavior of an application, we propose an approach transforming its blocks into an actions system with precedence constraints. The purpose is to exploit previous theories on the scheduling of real-time systems. To deploy FBs networks in feasible OS tasks, we propose a Hybrid scheduling approach combining an off-line non-preemptive scheduling and an on-line preemptive one. The off-line scheduling allows to construct OS tasks from FBs, whereas the on-line one allows to schedule these tasks according to the classical EDF policy. A constructed OS task is an actions sequence defining an execution scenario of the application. Thanks to this approach, we reduce the context switching at run-time by merging application actions in OS tasks. In addition, the system feasibility is increased by applying an on-line preemptive policy. Finally, the last thesis contribution is an extension of the previous one. We propose an approach allocating FBs networks in a distributed architecture. Based on a heuristic, such approach uses the hybrid method to construct feasible OS tasks in calculators. The allocation problem of a particular application FB is to look for a corresponding calculator while respecting functional, temporal and execution support constraints. We note that the proposed heuristic is based on a back-tracking technic to increase the solutions space
Plainchault, Mélanie. "Conception de protocoles DDF pour le déploiement de relais auto-configurables." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00958365.
Raffin, Erwan. "Déploiement d'applications multimédia sur architecture reconfigurable à gros grain : modélisation avec la programmation par contraintes." Phd thesis, Université Rennes 1, 2011. http://tel.archives-ouvertes.fr/tel-00642330.
Khouri, Selma, and Selma Khouri. "Cycle de vie sémantique de conception de systèmes de stockage et manipulation de données." Phd thesis, ISAE-ENSMA Ecole Nationale Supérieure de Mécanique et d'Aérotechique - Poitiers, 2013. http://tel.archives-ouvertes.fr/tel-00926657.
Anaya, Arenas Ana Maria. "Planification de la distribution en contextes de déploiement d'urgence et de logistique hospitalière." Doctoral thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/26564.
Optimisation in distribution is a major concern towards the performance’s improvement of manufacturing and service industries. Together with the evolution of the business’ world and technology advancements, new practical challenges need to be faced by managers. These challenges are thus a point of interest to researchers. This thesis concentrates on the application of operational research (O.R.) techniques to optimise supply chains in two precise contexts: relief distribution and healthcare logistics. These two research domains have grown a lot recently and have major impacts on the population. These are two complex and difficult distribution settings that require a scientific approach to improve their performance and thus warrant the welfare among the population. This thesis’s contributions relate to those two axes. First, we present a systematic review of the available literature in relief distribution (Chapter 2) to consolidate and classify the most important works in the field, as well as to identify the research’s gaps in the current propositions and approaches. This analysis inspires and supports our second contribution. In Chapter 3, we present and evaluate three models to optimise the design of relief distribution networks oriented to fairness in distribution. The models seek to ensure an equitable distribution between the points of demand and in a stable fashion in time. In addition, the models allow the backorder of demand to offer a more realistic and flexible distribution plan. The second research context result from a request from Quebec’s Ministry of Health and Social Services (Ministère de la Santé et des Services sociaux – MSSS). In partnership with the managers of Quebec’s healthcare system, we propose an approach to tackle the biomedical sample transportation problem faced by the laboratories’ network in Quebec’s province. We propose two mathematical formulations and some fast heuristics to solve the problem (Chapter 4). This contribution is later extended to include the opening hours’ synchronisation for the specimen collection centers and the number and frequency of pick-ups. We propose an iterated local search procedure (ILS) to find a routing plan minimising total billable hours (Chapter 5). This leads to an efficient tool to routing planning in the medical laboratories’ network in Quebec.
Miquée, Sébastien. "Exécution d'applications parallèles en environnements hétérogènes et volatils : déploiement et virtualisation." Phd thesis, Université de Franche-Comté, 2012. http://tel.archives-ouvertes.fr/tel-00979300.
Ahmed, Nacer Amina. "Contributions au déploiement sécurisé de processus métiers dans le cloud." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0013/document.
The fast evolution and development of technologies lead companies to grow faster in order to remain competitive and to offer services which are at the cutting edge of technology, meeting today’s market needs. Indeed, companies that are subject to frequent changes require a high level of flexibility and agility. Business Process Management (BPM) allows them to better manage their processes. Moreover, the emergence of Cloud Computing and all its advantages (flexibility and sharing, optimized cost, guaranteed accessibility... etc) make it particularly attractive. Thus, the combination of these two concepts allows companies to refloat their capital. However, the use of the cloud also implies new requirements in term of security, which stem from its shared environment, and which slow down its widespread adoption. The objective of this thesis consists in proposing concepts and tools that help and guide companies to deploy safely their processes in a cloud environment. A first contribution is an obfuscation algorithm that automates the decomposition and deployment of processes without any human intervention, based on the nature of the fragments. This algorithm limits the rate of information on each cloud through a set of separation constraints, which allow to deploy fragments considered as sensitive on different clouds. The second contribution of this thesis consists in complicating the structure of the process in order to limit the risk of clouds coalition. This is done through the introduction of fake fragments at certain strategic points in the process. The goal is to make generated collaborations more resistant to attacks, and thus reducing the likelihood of coalition. Even if obfuscation and complexification operations protect companies’ know-how during a cloud deployment, a risk remains. In this context, this thesis also proposes a risk model for evaluating and quantifying the security risks to which the process remain exposed after deployment. The purpose of this model is to combine security information with other dimensions of quality of service such as cost, for the selection of optimized configurations. The proposed approaches are implemented and tested through different process configurations. Their validity is verified through a set of metrics, whose objective is to measure the complexity of the processes as well as the remaining risk level after obfuscation
Alimi, Vincent. "Contributions au déploiement des services mobiles et à l'analyse de la sécurité des transactions." Phd thesis, Caen, 2012. http://www.theses.fr/2012CAEN2061.
Electronic transactions have paved the way for a multitude of services in various forms : a home banking web portal, an access control smart card opening a door or paying a transit fare, or an application downloaded onto a computer or a mobile device such a personal digital assistant or a mobile phone. The latter category of mobile equipment is extremely promising in terms of service offers. Indeed, a mobile handheld device is connected to the Internet with speeds higher and higher and is also more powerful. With the advent of the NFC (Near Field Communication) technology and secure architectures, mobile devices now has the ability to host sensitive applications in a secure chip, called « Secure Element ». Unlike plastic form factors, the Secure Element is a dynamic environment where you can download applications that will be accessible by a reader such as a point of sale or an access control reader. Those services are called mobile contactless services or NFC mobile services. We propose in this thesis several contributions to facilitate the deployment of mobile services based on a Secure Element. The adoption of this high added value services relies on an infrastructure and tools shared by different actors. As a first step, we propose three contributions to aid the deployment of mobile services Secure Element based allowing to: facilitate the personalization of a Secure Element by a TSM non-owner thereof, facilitate the exchange of keys for the TSM and perform a transaction with a mobile phone as a point of sale. In a second step, we focus on the analysis of payment transactions
Anssens, Charles. "Déploiement de la technologie RFID pour de nouveaux usages dans les industries du commerce." Thesis, Lille 1, 2012. http://www.theses.fr/2012LIL10001/document.
The rise of the internet of things will allow for the retail sector new opportunities of development. To access to this technology it remains a lot of technical challenges. Currently in the warehouses equipped with RFID there is a trade off between radiated power which determines the ability to read 100% of the targeted tag’s population and the quality of the information. To ensure a 100% of reading of this population the risk is to read others tags, in another tag population: the adjacent portal or in the warehouse stock. The RFID in warehouse has to improve the information quality to get a rise of deployment in industry. Our goal is to improve the efficiency in stock management for warehouses or retail stores by correcting the cross readings. We decided to consider the implementation of a RFID sensor network. This technology is based on a network of nodes in which each node collects data of its environment. By placing the nodes and meshing the surface it is now possible to cover a space. First we will explain the context and the standards of RFID for the retail. Then we will present a sensor network system design to make the inventory of items. Finally we will examine the optimization for the retail environment. The environment conditions impact on the reading rate, many parameters from the environment impact on the performance. The multi-path effect decreases the reading rate specialy in a RFID sensor network where all elements are static. The main solution is to use antenna array to get diversity in the radiation field and to get a high reading rate
Guerra, Matteo. "Le déploiement et l'évitement d'obstacles en temps fini pour robots mobiles à roues." Thesis, Ecole centrale de Lille, 2015. http://www.theses.fr/2015ECLI0024/document.
This dissertation work addresses the obstacle avoidance for wheeled mobile robots. The supervisory control framework coupled with the output regulation technique allowed to solve the obstacle avoidance problem and to formally prove the existence of an effective solution: two outputs for two objectives, reaching the goal and avoiding the obstacles. To have fast, reliable and robust results the designed control laws are finite-time, a particular class very appropriate to the purpose. The novelty of the approach lies in the easiness of the geometric approach to avoid the obstacle and on the formal proof provided under some assumptions. The solution have been thus extended to control a leader follower formation which, sustained from the previous result, uses two outputs but three controls to nail the problem. The Leader role is redesigned to be the reference of the group and not just the most advanced agent, moreover it has a active role slowing down the formation in case of collision avoidance manoeuvre for some robots. The proposed method, formally proven, makes the group move together and allow each agent to avoid obstacles or collision in a decentralized way. In addition, a further contribution of this dissertation, it is represented by a modification of the well known potential field method to avoid one of the common drawback of the method: the appearance of local minima. Control theory tools helps again to propose a solution that can be formally proven: the application of the definition of Input-to-State Stability (ISS) for decomposable sets allows to treat separate obstacles adding a perturbation which is able to move the trajectory away from a critic point
Loulou-Aloulou, Monia. "Approche formelle pour la spécification, la vérification et le déploiement des politiques de sécurité dynamiques dans les systèmes à base d’agents mobiles." Thesis, Bordeaux 1, 2010. http://www.theses.fr/2010BOR14088/document.
We develop two complementary aspects related to the security of mobile agent systems: the static and dynamic aspect. The first is related to the specification of security policies which treats the various security concerns in mobile agent systems and covers the various concepts related to the modeling of such systems. The dynamic aspect takes an interest to define a set of elementary operations which may change a given policy and a framework that expresses the adaptability of the agent policy to the security requirements of the new visited system. All Specifications are coded in Z notation.Another main contribution consists in providing a formal verification framework which gives more completeness and more consistency to the proposed specifications for both aspects. All checking processes are implemented under the Z/EVES theorem prover. Finally, we have take advantage from this theoretical work and we have defined an operational framework for enforcement security policies which combine the strengths of AOP with those of formal methods
Kam, Ollé Michel. "Prédiction pour la gestion intelligente territorialisée de la ressource renouvelable photovoltaïque & intégration par déploiement d’un réseau de capteurs IoT LoRaWAN." Electronic Thesis or Diss., Université de Lorraine, 2021. http://www.theses.fr/2021LORR0197.
The implementation of decentralized electrical micro-grids base on renewable energies is a challenge for the power supplies of telecommunication infrastructures. These power sources supply from off-grid photovoltaic and micro-wind systems are more suitable for remote or isolated sites like telecom antennas considering the local installation feasibilities and renewable resource availabilities. However, the intermittence and the variability of renewable sources require to ensure the balance between the production and the consumption of energies. In addition, the system sizing requires a trade-off between size, investment cost, safety and reliability of the power supply due to the intermittency. This thesis aims to develop a model characterizing the global solar irradiation variability to predict PV productions from data recorded on sites and over a long period. We validated the calibration methods of the Weibull function allowing a reliable prediction of the global irradiation in a semi-continental climate (mainland French sites). More precisely, we experimentally determine the Weibull parameters for obtaining a reliable global irradiation forecast prediction by considering the sun incident radiation during time periods. This forecast allows to estimate the yearly energy generation and its prediction during the time evolution from a PV plant in considered sites. The originality of the proposed approach is to obtain reliable predictive yearly PV energy distributions which also can be used to generate synthetic data times series of the global irradiation. The proposed model is based a parametrized mathematical formula providing reliable prediction results and which can be integrated to a real-time data acquisition system. To validate the proposed approach for the prediction of the PV power source supplying of telecommunication infrastructures, we developed an IoT sensors network for real-time acquisition to instrument a telecom antenna allowing a wide area network coverage. We demonstrate that deployed networked IoT sensors based on LoRaWAN protocol on a traditional telecommunication tower operating under real conditions communicate reliably without affecting the tower’s functions while keeping the data quality of the sensors. The proposed LoRaWAN network is used for the data acquisition of the weather parameters performing the proposed forecast of the real-time PV production. The software implementation of the proposed prediction model interfaced to weather sensors allows a real-time and intelligent management of deployed renewable energy systems. Future work is also discussed to develop renewable energies on a wide territory with a semi-continental climate