Dissertations / Theses on the topic 'Détection de la popularité'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Détection de la popularité.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Debure, Jonathan. "Détection de comportements et identification de rôles dans les réseaux sociaux." Electronic Thesis or Diss., Paris, CNAM, 2021. http://www.theses.fr/2021CNAM1290.
Full textSocial networks (SN) are omnipresent in our lives today. Not all users have the same behavior on these networks. If some have a low activity, rarely posting messages and following few users, some others at the other extreme have a significant activity, with many followers and regularly posts. The important role of these popular SN users makes them the target of many applications for example for content monitoring or advertising. After a study of the metadata of these users, in order to detect abnormal accounts, we present an approach allowing to detect users who are becoming popular. Our approach is based on modeling the evolution of popularity in the form of frequent patterns. These patterns describe the behaviors of gaining popularity. We propose a pattern matching model which can be used with a data stream and we show its scalability and its performance by comparing it to classic models. Finally, we present a clustering approach based on PageRank. This work allow to identify groups of users sharing the same role, using the interaction graphs
Auberger, Antoine. "Popularité, cycles et politique économique." Paris 2, 2001. http://www.theses.fr/2001PA020024.
Full textDarnat, Pénélope. "Cycline A, un nouveau lien entre cycle et popularité cellulaires." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS293.
Full textDuring an asymmetric cell division (ACD), the cell cycle and cell proliferation are coordinated to serve cell fate diversity. In the case of an ACD occurring in epithelia, the Planar Cell Polarity, lead by Frizzled (Fz) and Dishevelled (Dsh) orients the mother cell and the mitotic spindle to induce a polarity upon which the cell fate determinants are asymmetrically divided between the daughter cells. In this context, my thesis subject relies on the study of the links between cell cycle and cell polarity in the model of the lineage of mecanosensory organs of Drosophila, from which four distinct cell fates rise. At each division, the Notch pathway is asymmetrically activated and the PCP regulates the stereotyped orientations of the divisions along the epithelial plan. During the ACD of the pI cell, I have shown that one of these links was the major actor the cell cycle Cyclin A. Indeed, I have shown that a pool of Cyclin A localises asymmetrically the apical posterior cortex of the pi cell during prophase. This portion of Cyclin A is degraded at the same time of the cytoplasmic pool. Then, I have shown that Cyclin A co-localised with the PCP factor Fz and Dsh, as they anchors CycA to the cortex: a fz or dsh loss of function (LOF) abolishes the cortical recruitment of Cyclin A and the delocalisation of Frizzled drags Cyclin A. More importantly, I have shown that Cyclin A also regulates the orientation of the division as PCP factors, as its LOF or ectopic cortical localisation deviated the orientation. Altogether this data suggest that Cyclin A is part of complex regulating the spindle orientation formed by Fz and Dsh. In order to do so, Cyclin A is required for the apical posterior recruitment of the Mud protein (NuMA/LIN-5). This work opens the door on the roles, poorly described, of the cells cycle factors in other biological processes
Bernardini, César. "Stratégies de Cache basées sur la popularité pour Content Centric Networking." Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0121/document.
Full textContent Centric Networking (CCN) is a new architecture for a future Internet. CCN includes in-network caching capabilities at every node. Its effciency depends drastically on performances of caching strategies. A lot of studies proposing new caching strategies to improve the performances of CCN. However, among all these strategies, it is still unclear which one performs better as there is a lack of common environment to compare these strategies. In this thesis, we address the challenge of selecting the best caching strategies for CCN. The contribution of this thesis are the following. We build a common evaluation scenario and we compare via simulation the state of the art caching strategies: Leave Copy Everywhere (LCE), Leave Copy Down (LCD), ProbCache, Cache "Less" For More and MAGIC. We analyze the performance of all the strategies in terms of Cache Hit, Stretch, Diversity and Complexity, and determine the cache strategy that fits the best with every scenario. Later on, we propose two novel caching strategies for CCN based on popularity. First, we study popularity of content and we present Most Popular Caching (MPC) strategy. MPC privileges distribution of popular caches into the caches and thus, it overcomes other caching strategies. Second, we present an alternative caching strategy based on social networks: Socially-Aware Caching Strategy (SACS). SACS privileges distribution of content published by influential users into the network. Both caching strategies overcome state of the art mechanisms and, to the best of our knowledge, we are the first to use social information to build caching strategies
Reiffers-Masson, Alexandre. "Compétition sur la visibilité et la popularité dans les réseaux sociaux en ligne." Thesis, Avignon, 2016. http://www.theses.fr/2016AVIG0210/document.
Full textThis Ph.D. is dedicated to the application of the game theory for the understanding of users behaviour in Online Social Networks. The three main questions of this Ph.D. are: " How to maximize contents popularity ? "; " How to model the distribution of messages across sources and topics in OSNs ? "; " How to minimize gossip propagation and how to maximize contents diversity? ". After a survey concerning the research made about the previous problematics in chapter 1, we propose to study a competition over visibility in chapter 2. In chapter 3, we model and provide insight concerning the posting behaviour of publishers in OSNs by using the stochastic approximation framework. In chapter 4, it is a popularity competition which is described by using a differential game formulation. The chapter 5 is dedicated to the formulation of two convex optimization problems in the context of Online Social Networks. Finally conclusions and perspectives are given in chapter 6
Magni, Berton Raul. "Polarisation politique et comportements gouvernementaux : causes et conséquences de la popularité des gouvernements représentatifs." Paris 4, 2002. http://www.theses.fr/2002PA040133.
Full textDumont, Martin. "Le refus d'agir prosocialement et la popularité de l'enfant dans son groupe de pairs." Thèse, Université du Québec à Trois-Rivières, 1989. http://depot-e.uqtr.ca/5609/1/000577719.pdf.
Full textTotel, Eric. "Techniques de détection d'erreur appliquées à la détection d'intrusion." Habilitation à diriger des recherches, Université Rennes 1, 2012. http://tel.archives-ouvertes.fr/tel-00763746.
Full textJung, Christophe. "Détection informatisée d'interférences médicamenteuses." Strasbourg 1, 1988. http://www.theses.fr/1988STR15005.
Full textRankin, Young Margot. "Le contentement, l'anxiété, l'efficacité personnelle et la popularité en fonction des dimensions stables et instables du retrait social chez l'enfant." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0021/MQ47271.pdf.
Full textJezequel, Loïc. "Vers une détection d'anomalie unifiée avec une application à la détection de fraude." Electronic Thesis or Diss., CY Cergy Paris Université, 2023. http://www.theses.fr/2023CYUN1190.
Full textDetecting observations straying apart from a baseline case is becoming increasingly critical in many applications. It is found in fraud detection, medical imaging, video surveillance or even in manufacturing defect detection with data ranging from images to sound. Deep anomaly detection was introduced to tackle this challenge by properly modeling the normal class, and considering anything significantly different as anomalous. Given the anomalous class is not well-defined, classical binary classification will not be suitable and lack robustness and reliability outside its training domain. Nevertheless, the best-performing anomaly detection approaches still lack generalization to different types of anomalies. Indeed, each method is either specialized on high-scale object anomalies or low-scale local anomalies.In this context, we first introduce a more generic one-class pretext-task anomaly detector. The model, named OC-MQ, computes an anomaly score by learning to solve a complex pretext task on the normal class. The pretext task is composed of several sub-tasks allowing it to capture a wide variety of visual cues. More specifically, our model is made of two branches each representing discriminative and generative tasks.Nevertheless, an additional anomalous dataset is in reality often available in many applications and can provide harder edge-case anomalous examples. In this light, we explore two approaches for outlier-exposure. First, we generalize the concept of pretext task to outlier-exposure by dynamically learning the pretext task itself with normal and anomalous samples. We propose two the models SadTPS and SadRest that respectively learn a discriminative pretext task of thin plate transform recognition and generative task of image restoration. In addition, we present a new anomaly-distance model SadCLR, where the training of previously unreliable anomaly-distance models is stabilized by adding contrastive regularization on the representation direction. We further enrich existing anomalies by generating several types of pseudo-anomalies.Finally, we extend the two previous approaches to be usable in both one-class and outlier-exposure setting. Firstly, we introduce the AnoMem model which memorizes a set of multi-scale normal prototypes by using modern Hopfield layers. Anomaly distance estimators are then fitted on the deviations between the input and normal prototypes in a one-class or outlier-exposure manner. Secondly, we generalize learnable pretext tasks to be learned only using normal samples. Our proposed model HEAT adversarially learns the pretext task to be just challenging enough to keep good performance on normal samples, while failing on anomalies. Besides, we choose the recently proposed Busemann distance in the hyperbolic Poincaré ball model to compute the anomaly score.Extensive testing was conducted for each proposed method, varying from coarse and subtle style anomalies to a fraud detection dataset of face presentation attacks with local anomalies. These tests yielded state-of-the-art results, showing the significant success of our methods
Freitas, David de. "Sondes de détection gamma : optimisation pour la détection peropératoire dans le cancer du sein." Clermont-Ferrand 1, 2003. http://www.theses.fr/2003CLF1MM25.
Full textMatei, Cornel-Marius. "Comparaison entre les approches statistique et géométrique dans la détection des détection des défaillances." Lille 1, 2000. http://www.theses.fr/2000LIL10125.
Full textPoulard, Fabien. "Détection de dérivation de texte." Phd thesis, Université de Nantes, 2011. http://tel.archives-ouvertes.fr/tel-00590708.
Full textRibes, Aurélien. "Détection statistique des changements climatiques." Phd thesis, Université Paul Sabatier - Toulouse III, 2009. http://tel.archives-ouvertes.fr/tel-00439861.
Full textJay, Emmanuelle. "Détection en Environnement non Gaussien." Phd thesis, Université de Cergy Pontoise, 2002. http://tel.archives-ouvertes.fr/tel-00174276.
Full textAvec l'évolution technologique des systèmes radar, la nature réelle du fouillis s'est révélée ne plus être Gaussienne. Bien que l'optimalité du filtre adapté soit mise en défaut dans pareils cas, des techniques TFAC (Taux de Fausses Alarmes Constant) ont été proposées pour ce détecteur, dans le but d'adapter la valeur du seuil de détection aux multiples variations locales du fouillis. Malgré leur diversité, ces techniques se sont avérées n'être ni robustes ni optimales dans ces situations.
A partir de la modélisation du fouillis par des processus complexes non-Gaussiens, tels les SIRP (Spherically Invariant Random Process), des structures optimales de détection cohérente ont pu être déterminées. Ces modèles englobent de nombreuses lois non-Gaussiennes, comme la K-distribution ou la loi de Weibull, et sont reconnus dans la littérature pour modéliser de manière pertinente de nombreuses situations expérimentales. Dans le but d'identifier la loi de leur composante caractéristique qu'est la texture, sans a priori statistique sur le modèle, nous proposons, dans cette thèse, d'aborder le problème par une approche bayésienne.
Deux nouvelles méthodes d'estimation de la loi de la texture en découlent : la première est une méthode paramétrique, basée sur une approximation de Padé de la fonction génératrice de moments, et la seconde résulte d'une estimation Monte Carlo. Ces estimations sont réalisées sur des données de fouillis de référence et donnent lieu à deux nouvelles stratégies de détection optimales, respectivement nommées PEOD (Padé Estimated Optimum Detector) et BORD (Bayesian Optimum Radar Detector). L'expression asymptotique du BORD (convergence en loi), appelée le "BORD Asymptotique", est établie ainsi que sa loi. Ce dernier résultat permet d'accéder aux performances théoriques optimales du BORD Asymptotique qui s'appliquent également au BORD dans le cas où la matrice de corrélation des données est non singulière.
Les performances de détection du BORD et du BORD Asymptotique sont évaluées sur des données expérimentales de fouillis de sol. Les résultats obtenus valident aussi bien la pertinence du modèle SIRP pour le fouillis que l'optimalité et la capacité d'adaptation du BORD à tout type d'environnement.
Demattei, Christophe. "Détection d'agrégats temporels et spatiaux." Phd thesis, Université Montpellier I, 2006. http://tel.archives-ouvertes.fr/tel-00134491.
Full textNous proposons une revue des méthodes existantes ainsi que notre contribution dans différentes directions. Deux approches sont proposées dans le cadre temporel permettant pour l'une d'éviter l'utilisation de simulations et pour l'autre de prendre en compte les données dont l'information temporelle est incomplète. Nous avons également mis au point une méthode de détection de clusters spatiaux de forme arbitraire permettant d'analyser des données dont on connaît la localisation géographique exacte. Cette approche a été appliquée sur des données particulières, celles obtenues par Imagerie par Résonance Magnétique fonctionnelle. Les perspectives d'analyse spatio-temporelle sont finalement évoquées.
Després, Philippe. "Contrôle et détection du chaos." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ53937.pdf.
Full textRoy, Anne-Marie. "Détection de charge rapide radiofréquence." Mémoire, Université de Sherbrooke, 2015. http://hdl.handle.net/11143/8155.
Full textDematteï, Christophe. "Détection d'agrégats temporels et spatiaux." Montpellier 1, 2006. http://www.theses.fr/2006MON1T012.
Full textLavergne, Thomas. "Détection des textes non-naturels." Paris, Télécom ParisTech, 2009. http://www.theses.fr/2009ENST0074.
Full textThis thesis concerns unnatural language detection, especially in the context of fighting web spam. The main goal is to improve the quality of results produced by web search engines by automatically distinguishing between legitimate and fake content. In the first part, the thesis focuses on various kinds of fake content that can be found on the web, how it can be used to generate Web spam, and on the existing methods used to detect it. In the second part, a more general problem of the essence of unnatural texts is studied. Three definitions are proposed and illustrated through a taxonomy of such texts, the last one being a pragmatic definition usable in the context of automatic detection of unnatural texts. Te last part describes detection methods adapted to the different kinds of unnatural texts found in Web spam. These methods, based on statistical models, use the structure as well as the content of texts and are validated on both synthetic and real data
Buzid, Sultan. "Détection magnétique de matériaux enterrés." Reims, 2009. http://theses.univ-reims.fr/exl-doc/GED00001027.pdf.
Full textThis contribution has been developed in the following of previous work realised in the laboratory. The objective is to design a "smart" and reliable identification system of buried pipelines without excavation. For this purpose, a teledectectable code must be inserted into the existing coloured alarm net commonly used for public works. In this thesis work, a magnetic materiel is used and studied to conceive the code. Its main advantage is that it has a very high magnetic permeability. With the device developed in the laboratory, it is detectable at more than one meter deep. Its response is non-linear, it contains specific harmonic components. The combination of many magnetic elements defines a code family. Its low thickness allows it to be integrated into the existing net alarm used for public works and ensures compatibility with existing standards. In this contribution, the magnetic behaviour of nanocrystalline materials is discussed for understanding the specific properties and justifying the choice of the material. A specific processing is developed, it includes: sensor functioning, acquisition system, signal conditioning. .
Chkeif, Ammar. "Détection multiutilisateur à antennes multiples." Paris, ENST, 1999. http://www.theses.fr/1999ENST0044.
Full textAmmar, Mahmoud. "Détection multi-utilisateurs pour l'UMTS." Brest, 2002. http://www.theses.fr/2002BRES2006.
Full textThis thesis deals with multiuser detection for the uplink transmissions of third generation radio mobile systems (UMTS). The performance of the conventional detector is limited and it can be significantly degraded by MAI and the near-far effect. These problems can, however, be combatted with multiuser detection. The multiuser detector studied in this thesis is the Subtractive Interference Canceller, chosen because of its relatively low complexity and suitability for hardware implementation. There are two main categories of cancellers: the Parellel Interference canceller (PIC) and the Successive Interference canceller (SIC). We are more particularly interested in the problem of the uplink transmissins of the UMTS-FDD system, for which all the signatures of the users are known by the receiver. In this context, we have proposed a new strategy based on an iterative implementation of the suppression of interferences which makes it possible to deal with this problem in the case of asynchronous transmission on multipath channels. We have proposed two multi-user detectors. The first one is based on the SIC structure (SIC/RAKE) and the second one uses the PIC structure (PIC/RAKE). A comparison of the performances of the two detectors proposed in a UMTS-FDD context shows that the convergence of the SIC/RAKE detector is faster than that of the PIC/RAKE and the PIC/RAKE detector diverges in certain cases. To complete this study, we have proposed a new multi-user method of multipath channel estimation. This method uses conventionel channel estimation algorithms in an iterative interference cancellation structure. We could thus highlight the potentialities of the proposed SIC/RAKE structure in terms of performances as well as in terms of robustness with respect to the errors in the channel estimation
Taouil, Khaled. "Faisabilité en détection des mélanomes." Rouen, 1995. http://www.theses.fr/1995ROUES038.
Full textBoyer, David. "Détection photothermique de nanoparticules métalliques." Bordeaux 1, 2003. http://www.theses.fr/2003BOR12684.
Full textPoulard, Fabien B. "Détection de dérivation de texte." Nantes, 2011. http://www.theses.fr/2011NANT2023.
Full textThanks to the Internet, the production and publication of content is possible with ease and speed. This possibility raises the issue of controling the origins of this content. This work focuses on detecting derivation links between texts. A derivation link associates a derivative text and the pre-existing texts from which it was written. We focused on the task of identifying derivative texts given a source text for various forms of derivation. Our rst contribution is the denition of a theoretical framework denes the concept of derivation as well as a model framing the dierent forms of derivation. Then, we set up an experimental framework consisting of free software tools, evaluation corpora and evaluation metrics based on IR. The Piithie and Wikinews corpora we have developed are to our knowledge the only ones in French for the evaluation of the detection of derivation links. Finally, we explored dierent methods of detection based on the signature-based approach. In particular, we have introduced the notions of specicity and invariance to guide the choice of descriptors used to modelize the texts in the expectation of their comparison. Our results show that the choice of motivated descriptors, including linguistically motivated ones, can reduce the size of the modelization of texts, and therefore the cost of the method, while oering performances comparable to the much more voluminous state of the art approach
Righezza, Michel. "Détection électrochimique en chromatographie liquide." Université Paul Cézanne (Aix-Marseille). Faculté des sciences et techniques de Saint-Jérôme, 1986. http://www.theses.fr/1986AIX30042.
Full textNguyen, Minh Tien. "Détection de textes générés automatiquement." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM025/document.
Full textAutomatically generated text has been used in numerous occasions with distinct intentions. It can simply go from generated comments in an online discussion to a much more mischievous task, such as manipulating bibliography information. So, this thesis first introduces different methods of generating free texts that resemble a certain topic and how those texts can be used. Therefore, we try to tackle with multiple research questions. The first question is how and what is the best method to detect a fully generated document.Then, we take it one step further to address the possibility of detecting a couple of sentences or a small paragraph of automatically generated text by proposing a new method to calculate sentences similarity using their grammatical structure. The last question is how to detect an automatically generated document without any samples, this is used to address the case of a new generator or a generator that it is impossible to collect samples from.This thesis also deals with the industrial aspect of development. A simple overview of a publishing workflow from a high-profile publisher is presented. From there, an analysis is carried out to be able to best incorporate our method of detection into the production workflow.In conclusion, this thesis has shed light on multiple important research questions about the possibility of detecting automatically generated texts in different setting. Besides the researching aspect, important engineering work in a real life industrial environment is also carried out to demonstrate that it is important to have real application along with hypothetical research
Amiri, Arij. "Ruptures, singularités : détection et estimation." Electronic Thesis or Diss., Université de Lille (2022-....), 2022. http://www.theses.fr/2022ULILB030.
Full textThis Ph.D. thesis gathers some works concerning change-point problems for stochastic processes. In Part one, we are interested in the problem of the estimation, from [dollar]n[dollar] independent observations of an inhomogeneous Poisson process, of the location of what we call a smooth change-point (a point in which the intensity function of the process switches from one level to another smoothly, but over such a small interval, that its length [dollar]delta_n[dollar] can be considered as converging to~[dollar]0[dollar]). We show that in the case where [dollar]delta_n[dollar] goes to zero slower than [dollar]1/n[dollar] (slow case), our model is locally asymptotically normal (though with an unusual rate), and that in the case where [dollar]delta_n[dollar] goes to zero faster than [dollar]1/n[dollar] (fast case), our model is non-regular and behaves like a classic change-point model. All these results are obtained using the likelihood ratio analysis method of Ibragimov and Khasminskii, which equally yields the convergence of moments of the considered estimators. However, in order to apply this method in the fast case, we first had to adapt it to the topology [dollar]M_1[dollar] on the Skorokhod space of càdlàg functions, as well as to develop some tools for the study of convergence of functions in this topology. The Part two deals with the detection of a change in the Hölder regularity. We study the detection of an epidemic change in the regularity of an [dollar]n[dollar]-sample of i.i.d. random functions with Hölder regularity [dollar]alpha[dollar] under null hypothesis. Under the alternative hypothesis, a segment of the sample of an unknown location and length [dollar]l^star
Lung-Yut-Fong, Alexandre. "Détection de ruptures pour les signaux multidimensionnels. Application à la détection d'anomalies dans les réseaux." Phd thesis, Télécom ParisTech, 2011. http://pastel.archives-ouvertes.fr/pastel-00675543.
Full textGiroux, Hélène. "De la qualité à la qualité totale, évolution des notions, traduction et popularité dans les textes sur la gestion de la qualité." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0027/NQ52106.pdf.
Full textLoignon, Sacha. "De la popularité à l'obscurité : les rouages de la montée et du déclin de Federal Union, Inc. aux États-Unis, 1939-1945." Master's thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/27180.
Full textSmith, Isabelle. "Détection d'une source faible : modèles et méthodes statistiques : application à la détection d'exoplanètes par imagerie directe." Phd thesis, Université de Nice Sophia-Antipolis, 2010. http://tel.archives-ouvertes.fr/tel-00548905.
Full textDuvaut, Patrick. "Contraste et détection : application à la quantification et aux filtres de Volterra optimaux pour la détection." Paris 11, 1987. http://www.theses.fr/1987PA112040.
Full textDamerval, Christophe. "Ondelettes pour la détection de caractéristiques en traitement d'images. Application à la détection de région d'intérêt." Phd thesis, Université Joseph Fourier (Grenoble), 2008. http://tel.archives-ouvertes.fr/tel-00287008.
Full textLung-Yut-Fong, Alexandre. "Détection robuste de ruptures pour les signaux multidimensionnels : application à la détection d'anomalies dans les réseaux." Paris, Télécom ParisTech, 2011. https://pastel.hal.science/pastel-00675543.
Full textThe aim of this work is to propose non-parametric change-point detection methods. The main application of such methods is the use of data recorded by a collection of network sensors to detect malevolent attacks. The first contribution of the thesis work is a decentralized anomaly detector. Each network sensor applies a rank-based change-point detection test, and the final decision is taken by a fusion center which aggregates the information transmitted by the sensors. This method is able to process a huge amount of data, thanks to a clever filtering step. In the second contribution, we take into account the dependencies between the different sensors to improve the detection performance. Based on homogeneity tests that we have proposed to assess the similarity between different sets of data, the robust detection methods that we have designed are able to find one or more change-point in a multidimensional signal. We thus obtained robust and versatile methods, with strong theoretical properties, to solve a large collection of segmentation problems: network anomaly detection, econometrics, DNA analysis for cancer prognosis… The methods that we proposed are particularly adequate when the characteristics of the analyzed data are unknown
Damerval, Christophe. "Ondelettes pour la détection de caractéristiques en traitement d'images. Application à la détection de région d'intérêt." Phd thesis, Grenoble 1, 2008. http://www.theses.fr/2008GRE10050.
Full textThis thesis in image processing addresses the problem of the highlight of some remarquable structures, such as objects we perceive visually. These can be monodimensional, like contours, as well as bidimensional, corresponding to more complex objects. An important problem in computer vision consists on detecting such structures, and also extracting characteristic features from them. In many applications, such as object recognition, image matching, motion tracking or the enhancement of some particular elements, it is a first step before other high-level operations. Thereby, the formulation of performant detectors appears as essential. We show that this can be carried out using wavelet decompositions; in particular, it is possible to define some maxima lines, which turn out as relevant to this problem : one the one hand, so as to detect objects (given by some regions of interest), and, on the other hand, in order to characterize them (computations of Lipschitz regularity and of characteristic scale). This original approach for detection, based on maxima lines, can thus be compared to classical approches
Lefèvre, Sébastien. "Détection d'événements dans une séquence vidéo." Phd thesis, Université François Rabelais - Tours, 2002. http://tel.archives-ouvertes.fr/tel-00278073.
Full textCharbois, Vincent. "Détection mécanique de la résonance ferromagnétique." Phd thesis, Université Paris-Diderot - Paris VII, 2003. http://tel.archives-ouvertes.fr/tel-00003970.
Full textFourt, Denis. "Détection et localisation des panneaux routiers." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0017/MQ57404.pdf.
Full textSharif, Md Haidar. "Détection et suivi d'événements de surveillance." Phd thesis, Université des Sciences et Technologie de Lille - Lille I, 2010. http://tel.archives-ouvertes.fr/tel-00841465.
Full textNiang, Papa Maleye. "Langage déclaratif pour la détection d'intrusions." Thesis, Université Laval, 2014. http://www.theses.ulaval.ca/2014/30523/30523.pdf.
Full textMourougou-Candoni, Nadine. "Détection et Physico-chimie d'Objets Uniques." Habilitation à diriger des recherches, Université de la Méditerranée - Aix-Marseille II, 2010. http://tel.archives-ouvertes.fr/tel-00653247.
Full textGad, El Rab Mohammed. "Evaluation des systèmes de détection d'intrusion." Phd thesis, Université Paul Sabatier - Toulouse III, 2008. http://tel.archives-ouvertes.fr/tel-00366690.
Full textMartorell, Alexandre. "Détection à distance d’électroniques par l’intermodulation." Thesis, Montpellier, 2018. http://www.theses.fr/2018MONTS019/document.
Full textElectromagnetism, security and electronic warfare have been closely linked for decades. Their association gathers applications of radar surveillance, neutralization of electronic systems or detection of hidden electronics. Today, the multiplication of IEDs (Improvised Explosive Devices) both in theatres of operation and in urban environments leads to the need for their detection. The works of this thesis can enter into this theme and propose a new alternative that allows to highlight the presence of hidden RF receivers. The nonlinear radar is particularly suitable for detecting devices containing metals and (electronic) semiconductors. A popular technique is to transmit a single frequency f1 and receive the second harmonic generated by the target. Another less common technique consists of transmitting two frequencies, f1 and f2, and receiving intermodulation products of order 3 (2f1 - f2 and 2f2 - f1). An in-depth state of the art of nonlinear radar systems is made in a first chapter with a comparison of their characteristics. In a second chapter, an inductive test bench is developed to measure the reflected IM3 of an RF target. Thus analyses and orders of magnitude will be known helping the development of radar. In chapter 3, the IM3 radar demonstrator is developed. A wide range of RF systems, commercial and non-commercial, that may be found in operational environments are being tested. Their detection will validate the IM3 recovery technique. A new realistic IM3 radar link budget is implemented to estimate the actual radar detection range for different RF targets. In the last chapter the work focuses on the identification and classification of an RF target. The study focuses on the possibility of extracting all parameters to assist in a classification (hazard assessment) of RF receptors in an operational environment. The research work presented in this manuscript contributes to the improvement of hidden electronic detection techniques. A detection protocol was proposed describing the actions of the IM3 radar. It includes a frequency scan and then a power scan. The first tests were carried out on a walkie-talkie demonstrating the possibility of detecting its bandwidth via IM3 retransmission, at more than 2 m. The repeatability of the tests on an extended panel of RF receivers validates the detection protocol and the interest of the IM3 radar. An IM3 radar transmission power of 40 dBm, at an IM3 frequency of 400 MHz, can potentially detect a receiver at 80 m. Finally in a final exploratory work, we demonstrated that by observing the IM3 response reflected following a power scan the IM3 radar can add new identification criteria that discriminate the hidden receivers detected between them
Cauchon, Nicole. "Thérapie photodynamique et détection de l'apoptose." Thèse, Université de Sherbrooke, 2006. http://savoirs.usherbrooke.ca/handle/11143/4219.
Full textManfredi, Guido. "Détection de visages en domaines compressés." Mémoire, Université de Sherbrooke, 2011. http://savoirs.usherbrooke.ca/handle/11143/4905.
Full textTrégarot, Sébastien. "Détection et estimation de signaux radars." Lorient, 2009. http://www.theses.fr/2009LORIS150.
Full textVaezi-Nejad, Hossein. "Détection de défauts d'instruments de mesure." Nancy 1, 1990. http://docnum.univ-lorraine.fr/public/SCD_T_1990_0016_VAEZI_NEJAD.pdf.
Full text