Academic literature on the topic 'Détection d'activité des utilisateurs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Détection d'activité des utilisateurs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Détection d'activité des utilisateurs"
Perrey, S., G. Derosiere, G. Dray, and T. Ward. "La détection des états mentaux des utilisateurs par des signaux hémodynamiques mesurés par NIRS." Annals of Physical and Rehabilitation Medicine 56 (October 2013): e377. http://dx.doi.org/10.1016/j.rehab.2013.07.970.
Full textDjamba, Kalema Josue, and Baraka Ntawanga Irene. "INTEGRATION D'UNE APPLICATION MOBILE AU SYSTEME DE REGULATION DU NIVEAU D'EAU D'UN RESERVOIR." British Journal of Multidisciplinary and Advanced Studies 5, no. 1 (January 8, 2024): 8–22. http://dx.doi.org/10.37745/bjmas.2022.0388.
Full textDebar, Hervé. "La cybersécurité." Annales des Mines - Enjeux numériques 27, no. 3 (September 27, 2024): 120–27. http://dx.doi.org/10.3917/ennu.027.0120.
Full textGAZZANO, Olivier. "Imagerie Hyperspectrale Dans l’Infrarouge Thermique Avec Le Système Aéroporté Sieleters." Revue Française de Photogrammétrie et de Télédétection 224, no. 1 (December 22, 2022): 23–32. http://dx.doi.org/10.52638/rfpt.2022.510.
Full textYésou, Hervé, Aurélie Escudier, Stéphanie Battiston, Jean-Yves Dardillac, Stephen Clandillon, Carlos Uribe, Mathilde Caspard, et al. "Exploitation de l'imagerie Pléiades-THR en cartographie réactive suite à des catastrophes naturelles ayant affecté le territoire français en 2013." Revue Française de Photogrammétrie et de Télédétection, no. 209 (January 29, 2015): 39–45. http://dx.doi.org/10.52638/rfpt.2015.210.
Full textCouzon, F., A. Liogier, C. Boutet, and V. Gineys. "Comparaison de la dosimétrie et de la qualité d’image des équipements de radiologie conventionnelle utilisés pour les radiographies du Thorax et de l’ASP au niveau d’un GHT (Groupement Hospitalier de Territoire)." Radioprotection 59, no. 1 (January 2024): 3–12. http://dx.doi.org/10.1051/radiopro/2023037.
Full textDemargne, Julie, Pierre Javelle, Didier Organde, Léa Garandeau, and Bruno Janet. "Intégration des prévisions immédiates de pluie à haute-résolution pour une meilleure anticipation des crues soudaines." La Houille Blanche, no. 3-4 (October 2019): 13–21. http://dx.doi.org/10.1051/lhb/2019023.
Full textYakymchuk, Chris. "Applying Phase Equilibria Modelling to Metamorphic and Geological Processes: Recent Developments and Future Potential." Geoscience Canada 44, no. 1 (April 20, 2017): 27. http://dx.doi.org/10.12789/geocanj.2017.44.114.
Full textZwitter Vitez, Ana. "Présentation du volume." Linguistica 52, no. 1 (December 31, 2012): 7–8. http://dx.doi.org/10.4312/linguistica.52.1.7-8.
Full textVEISSIER, Isabelle, Florence KLING-EVEILLARD, Marie-Madeleine MIALON, Mathieu SILBERBERG, Alice DE BOYER DES ROCHES, Claudia TERLOUW, Dorothée LEDOUX, Bruno MEUNIER, and Nathalie HOSTIOU. "Élevage de précision et bien-être en élevage : la révolution numérique de l’agriculture permettra-t-elle de prendre en compte les besoins des animaux et des éleveurs ?" INRA Productions Animales, April 24, 2019, 281–90. http://dx.doi.org/10.20870/productions-animales.2019.32.2.2478.
Full textDissertations / Theses on the topic "Détection d'activité des utilisateurs"
Brissaud, Pierre-Olivier. "Analyse de trafic HTTPS pour la supervision d'activités utilisateurs." Electronic Thesis or Diss., Université de Lorraine, 2020. http://www.theses.fr/2020LORR0255.
Full textThe protection of the Internet users’ privacy has made every web service offer some security by using encryption. Thus, it is now impossible to use classical tools anymore, like DPI (deep pakets inspection), in order to detect malicious behaviour on the Internet. The main target of this thesis is to find new ways to monitor malicious behaviours despite the use of encryption (HTTPS). This new solution should, nevertheless, follow tree guidelines: passivity, transparency and privacy preservation. According to the works in the state of the art for encrypted traffic monitoring, they mainly focus about protocols or services detection but not about the detections of the users' behavior inside a service. The first objective is to construct a monitoring solution in order to detect some behaviour inside a web service protected by HTTPS used with HTTP/1.1. We develop an example which detects requests related to non-legitimate keywords on Images search engine by only monitoring the encrypted traffic. The solution reconstructs the size of the encrypted HTTP objects and builds a footprint of the related traffic by using the Kernel Density estimation method (KDE). The evaluation of this traffic classification when monitoring 10 000 keywords achieved an accuracy of more than 99% considering an open world scenario. Despite, this solution is very effective when monitoring HTTP/1.1 traffic, it shows some limitation when dealing with HTTP/2 traffic because of its impact on the traffic. Thus, the second goal is to adapt our knowledge for purposes of detecting keywords when HTTPS is used with HTTP/2. This new method is structured around some features collected on the encrypted traffic and use supervised machine learning (random forest) to classify them. The solution called H2Classifier is evaluated over four very used services (Amazon, Google, Google Images and Google Maps) and achieve a TPR between 61 and 98% depending of the service when monitoring 2000 keywords (per service) considering open world scenario. Finally, H2Classifier evaluated over the time, against new services and with new configurations too
Sagheer, Fakher. "Bayesian statistical methods for joint user activity detection, channel estimation, and data decoding in dynamic wireless networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. https://theses.hal.science/tel-04874844.
Full textGrant-free non-orthogonal multiple access (GF-NOMA) is gradually becoming an integral part of the physical layer of future radio access systems. By allowing access to a base station without explicit allocation of time/frequency/code resources, GF-NOMA not only improves spectral efficiency, but also enables ultra-reliable low latency communications (URLLC) . Such requirements will make it possible to meet the specific challenges of wireless applications such as the Internet of Things, virtual reality, online video games, communications between machines, vehicles, etc.However, GF-NOMA introduces a new challenge that does not exist in conventional communication systems, namely user activity detection: in addition to channel estimation, detection and decoding of interfering users, the base station receiver must be able to classify them into two categories: those who are active and transmitting and those who are not. The massiveness of the system, the absence of power control on transmission and/or orthogonality of user pilot sequences are all characteristics which complicate processing at the receiver.The general subject of this thesis is the study of new statistical methods based on message passing algorithms on appropriate factor graphs in order to jointly handle all these tasks at the receiver level.Are studied more precisely:- a method (1) of hybrid Bayesian inference based on the belief propagation algorithm (BP) and the expectation propagation algorithm (EP) to solve the problem of joint activity detection, channel estimation, and multi-user detection in a synchronous GF-NOMA system with no transmit power control, orthogonal pilot sequences and multiple receiver antennas. By introducing an approximation criterion to express message passing as Gaussian laws, channel estimation and multi-user detection can be efficiently processed by the EP algorithm. This proving impossible in this form for detecting user activity, message passing in BP form is used for this purpose. The proposed method includes a step of estimating the hyperparameters of the model, which are the energy of the received signals and the spatial correlation between the receiving antennas. A reduced complexity variant ignoring the spatial correlation between receiving antennas is also proposed;- a method (2) of Bayesian inference based on the EP algorithm exploiting complex analysis methods (Wirtinger derivatives) making it possible to process user activity detection also in the form of a Gaussian message passing algorithm;- a method (3) preceding method (2) with a Bayesian compressed acquisition method responsible for the initial estimation of the channel and user activity in the more complex context of massive access with non-orthogonal pilot sequences for the users.The evaluation by simulations of these different methods is carried out in the particular case of a synchronous GF-NOMA system by coding, interleaving and OFDM modulation (GF-OFDM-IDMA). The performance obtained (measured in terms of residual bit error rate for detection and decoding, root mean square error for channel estimation, and false alarm and missed-detection probabilities for activity detection) compare favorably with those obtained with traditional methods published in the literature. Keywords: NOMA, grant-free, massive access, OFDM, factor graphs, message passing algorithms, belief propagation, expectation propagation
Ammar, Mahmoud. "Détection multi-utilisateurs pour l'UMTS." Brest, 2002. http://www.theses.fr/2002BRES2006.
Full textThis thesis deals with multiuser detection for the uplink transmissions of third generation radio mobile systems (UMTS). The performance of the conventional detector is limited and it can be significantly degraded by MAI and the near-far effect. These problems can, however, be combatted with multiuser detection. The multiuser detector studied in this thesis is the Subtractive Interference Canceller, chosen because of its relatively low complexity and suitability for hardware implementation. There are two main categories of cancellers: the Parellel Interference canceller (PIC) and the Successive Interference canceller (SIC). We are more particularly interested in the problem of the uplink transmissins of the UMTS-FDD system, for which all the signatures of the users are known by the receiver. In this context, we have proposed a new strategy based on an iterative implementation of the suppression of interferences which makes it possible to deal with this problem in the case of asynchronous transmission on multipath channels. We have proposed two multi-user detectors. The first one is based on the SIC structure (SIC/RAKE) and the second one uses the PIC structure (PIC/RAKE). A comparison of the performances of the two detectors proposed in a UMTS-FDD context shows that the convergence of the SIC/RAKE detector is faster than that of the PIC/RAKE and the PIC/RAKE detector diverges in certain cases. To complete this study, we have proposed a new multi-user method of multipath channel estimation. This method uses conventionel channel estimation algorithms in an iterative interference cancellation structure. We could thus highlight the potentialities of the proposed SIC/RAKE structure in terms of performances as well as in terms of robustness with respect to the errors in the channel estimation
Abdi, Moussa. "Détection multi-utilisateurs en mode CDMA." Paris, ENST, 2002. http://www.theses.fr/2002ENST0027.
Full textChiodi, Roberto Frédéric. "Détection d'activité vocale basée sur la transformée en ondelettes." Thèse, Université du Québec à Trois-Rivières, 2010. http://depot-e.uqtr.ca/1293/1/030153819.pdf.
Full textOudet, Jean-Philippe. "Architecture distribuée pour la détection d'activité dans un Espace Intelligent." Mémoire, Université de Sherbrooke, 2011. http://savoirs.usherbrooke.ca/handle/11143/1634.
Full textMillerioux, Jean-Pierre. "Techniques de détection multi-utilisateurs pour les communications multifaisceaux par satellite." Phd thesis, Télécom ParisTech, 2006. http://pastel.archives-ouvertes.fr/pastel-00002006.
Full textKaroui, Jihen. "Détection automatique de l'ironie dans les contenus générés par les utilisateurs." Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30145/document.
Full textThis thesis aims to detect figurative language devices in social networks. We focus in particular on irony and sarcasm in Twitter and propose an approach based on supervised learning to predict if a tweet is ironic or not. This required three steps: (1) Analyze the pragmatic phenomena of irony and a multi-level annotation of a corpus of reference, (2) Development of an automatic detection system for French tweets that exploits both semantic features and the extra-linguistic context, (3) Study of the portability of the model to detect irony in a multilingual setting (Italian, English and Arabic). The obtained results for this extremely complex task are very encouraging and will allow a significant improvement of polarity detection in sentiments analysis
Burykh, Serguei. "Détection multi-utilisateurs et estimation aveugle du canal pour les systèmes CDMA." Paris, ENST, 2003. http://www.theses.fr/2003ENST0002.
Full textThis study deals with multi-user detection and blind channel estimation for DS/CDMA systems. Multi-user detection represents a class of signal processing algorithms designed to combat the multiple-access interference and channel effects. Blind channel estimation aims to identify the propagation channel based on the observed channel outputs and the a priori statistical information on the inputs. In this thesis, a number of techniques is proposed for the receivers of DS/CDMA systems which can be implemented on either uplink or downlink. The basic assumptions are the periodicity of spreading codes and the availability of the desired user's spreading code at the receiver. First group of the considered algorithms relates to linear multi-user detection. In this class, we consider reduced-rank Wiener filters and we develop a novel reduced-rank filter : CGRRF. We next consider the blind subspace-based multi-user detector of Wang & Poor and we develop its efficient adaptive implementation which combats jointly the MAI and ISI. The next part of the thesis deals with non-linear suboptimal multi-user detection known as interference cancellation. We develop the Blind Interference Canceller (BIC) which can be implemented in the mobile terminal as it assumes the knowledge of the preading code of the desired user only. Final part of this thesis dedicated to the blind channel estimation in presence of carrier offsets (or Dopplershifts). All algorithms designed in this work are validated numerically by computer simulations of DS/CDMA communications over fading multipath channels
Carlier, Florent. "Nouvelle technique neuronale de détection multi-utilisateurs : Applications aux systèmes MC-CDMA." Rennes, INSA, 2003. http://www.theses.fr/2003ISAR0019.
Full textBook chapters on the topic "Détection d'activité des utilisateurs"
SYLLA, Tidiane, Mohamed-Aymen CHALOUF, and Francine KRIEF. "Adaptation du niveau de sécurité des applications IoT." In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 251–75. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch10.
Full textGuignard, Brice, and Ludovic Seifert. "La préparation physique des sports collectifs." In La préparation physique des sports collectifs, 60–88. De Boeck Supérieur, 2023. https://doi.org/10.3917/dbu.paill.2023.01.0060.
Full text