Contents
Academic literature on the topic 'Mode d'opération'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mode d'opération.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mode d'opération"
Gilonne, Yves. "La Télé-commande." Nottingham French Studies 59, no. 3 (December 2020): 289–310. http://dx.doi.org/10.3366/nfs.2020.0292.
Full textBerthet, Jean-Louis. "Les modes d'intervention et les types d'opération de la ville de Grenoble (1972-1983)." Revue de géographie de Lyon 60, no. 3 (1985): 245–57. http://dx.doi.org/10.3406/geoca.1985.4060.
Full textDissertations / Theses on the topic "Mode d'opération"
Sibleyras, Ferdinand. "Security of Modes of Operation and other provably secure cryptographic schemes." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS477.
Full textThis thesis is about symmetric, or private key, cryptography. It has a focus on modes of operation and, more generally, on all cryptographic schemes that admit a formal proof of security with an accent on the cryptanalysis of such constructions. There are multiple contributions shown in this work. Firstly, we show an attack that recovers a secret information that has been encrypted via the counter mode (CTR) with a total complexity close to the known distinguisher. We also mount the first non-trivial forgeries on a variety of MACs following the Double-block Hash-then-Sum construction and whose data complexity was later proved to be optimal. Then, we propose a new authenticated encryption scheme (ANYDAE) which is derived from MONDAE, and we prove its security under to a more robust security notion. As for other cryptographic schemes, we establish a link between the famous 3-XOR problem and the cryptanalysis of two rounds of the Even-Mansour construction which allows us to build new attacks that are especially competitive in terms of data and memory complexities. Finally, we show a generic cryptanalysis on the iterated tweakable FX strategy that notably proves the optimality of the XHX2 security proof
Zhang, Jian. "Advance Surgery Scheduling with Consideration of Downstream Capacity Constraints and Multiple Sources of Uncertainty." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCA023.
Full textThis thesis deals with the advance scheduling of elective surgeries in an operating theatre that is composed of operating rooms and downstream recovery units. The arrivals of new patients in each week, the duration of each surgery, and the length-of-stay of each patient in the downstream recovery unit are subject to uncertainty. In each week, the surgery planner should determine the surgical blocks to open and assign some of the surgeries in the waiting list to the open surgical blocks. The objective is to minimize the patient-related costs incurred by performing and postponing surgeries as well as the hospital-related costs caused by the utilization of surgical resources. Considering that the pure mathematical programming models commonly used in literature do not optimize the long-term performance of the surgery schedules, we propose a novel two-phase optimization model that combines Markov decision process (MDP) and stochastic programming to overcome this drawback. The MDP model in the first phase determines the surgeries to be performed in each week and minimizes the expected total costs over an infinite horizon, then the stochastic programming model in the second phase optimizes the assignments of the selected surgeries to surgical blocks. In order to cope with the huge complexity of realistically sized problems, we develop a reinforcement-learning-based approximate dynamic programming algorithm and several column-generation-based heuristic algorithms as the solution approaches. We conduct numerical experiments to evaluate the model and algorithms proposed in this thesis. The experimental results indicate that the proposed algorithms are considerably more efficient than the traditional ones, and that the resulting schedules of the two-phase optimization model significantly outperform those of a conventional stochastic programming model in terms of the patients' waiting times and the total costs on the long run
Joerger, Guillaume. "Multiscale modeling and event tracking wireless technologies to improve efficiency and safety of the surgical flow in an OR suite." Thesis, La Rochelle, 2017. http://www.theses.fr/2017LAROS009/document.
Full textImproving operating room management is a constant issue for modern large hospital systems who have to deal with the reality of day to day clinical activity. As opposed to other industrial sectors such as air civil aviation that have mastered the topic of industry organization and safety, progress in surgical flow management has been slower. The goal of the work presented here is to develop and implement technologies that leverage the principles of computational science to the application of OR suite problems. Most of the currently available models of surgical flow are used for planning purposes and are essentially stochastic processes due to uncertainties in the available data. We propose an agent-based model framework that can incorporate all the elements, from communication skills of the staff to the time it takes for the janitorial team to go clean an OR. We believe that human factor is at the center of the difficulty of OR suite management and should be incorporated in the model. In parallel, we use a numerical model of airflow at the OR suite level to monitor and simulate environment conditions inside the OR. We hypothesize that the following three key ingredients will provide the level of accuracy needed to improve OR management : 1) Real time updates of the model with ad hoc sensors of tasks/stages 2) Construction of a multi-scale model that links all key elements of the complex surgical infrastructure 3) Careful analysis of patient population factors, staff behavior, and environment conditions. We have developed a robust and non-obtrusive automatic event tracking system to make our model realistic to clinical conditions. Not only we track traffic through the door and the air quality inside the OR, we can also detect standard events in the surgical process. We propose a computational fluid dynamics model of a part of an OR suite to track dispersion of toxic surgical smoke and build in parallel a multidomain model of potential nosocomial contaminant particles flow in an OR suite. Combining the three models will raise the awareness of the OR suite by bringing to the surgical staff a cyber-physical system capable of prediction of rare events in the workflow and the safety conditions