Academic literature on the topic 'Safety logiciel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Safety logiciel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Safety logiciel"
PENNEROUX, J. "Lancement d'un logiciel de formation à la radioprotection." Radioprotection 29, no. 3 (July 1994): 405–6. http://dx.doi.org/10.1051/radiopro/1994012.
Full textPIPAUD, J. Y. "RADIOR, un logiciel d'initiation à l'optimisation de la radioprotection." Radioprotection 30, no. 1 (January 1995): 103–4. http://dx.doi.org/10.1051/radiopro/1995019.
Full textRenaud, Ph, H. Maubert, D. Robeau, I. Linge, O. Pavlovsky, and I. Ossipiants. "PARIS : un logiciel de simulation d'états radioécologiques post-accidentels." Radioprotection 32, no. 4 (October 1997): 521–32. http://dx.doi.org/10.1051/radiopro:1997116.
Full textBourgois, L., and H. Lelache. "TransporaD version 2.0 un logiciel sur la réglementation des transports de matières radioactives." Radioprotection 33, no. 2 (April 1998): 189–91. http://dx.doi.org/10.1051/radiopro:1998105.
Full textMaubert, Henri, Philippe Renaud, Jean-Christophe Bernié, Guillaume de Drouas, Philippe Fache, and Jean-Michel Métivier. "ASTRAL : un logiciel pour l'évaluation des conséquences d'un rejet accidentel de radionucléides dans l'environnement." Radioprotection 32, no. 3 (July 1997): 357–69. http://dx.doi.org/10.1051/radiopro:1997112.
Full textJARVIS, N. S., and A. BIRCHALL. "LUDEP 1.0, un logiciel pour ordinateur personnel qui applique le nouveau modèle pulmonaire de la CIPR." Radioprotection 29, no. 1 (January 1994): 81–86. http://dx.doi.org/10.1051/radiopro/1994023.
Full textEgan, Rylan, Jessica Baumhour, Monica Mullin, Amelia Wilkinson, Sara Awad, Johanna Murphy, Nancy Dalgarno, Angela Coderre-Ball, and Geneviève Digby. "Resident and Attending Physician Perceptions of a Quality and Safety Curriculum." Canadian Journal of General Internal Medicine 16, no. 3 (September 21, 2021): e62-e73. http://dx.doi.org/10.22374/cjgim.v16i3.495.
Full textGROUZELLE, C., F. LAYLAVOIX F., M. F. BAUDOT, and R. DUCOUSSO. "Logiciel pour une évaluation rapide des conséquences d'une retombée radioactive sur la chaîne alimentaire : applications au milieu tropical." Radioprotection 30, no. 1 (January 1995): 79–88. http://dx.doi.org/10.1051/radiopro/1995024.
Full textDegrange, J. P., F. P. Levy, and T. Schneider. "ECRS : Un logiciel pour l'évaluation du risque et des contre-mesures associés à l'exposition au radon dans les habitations." Radioprotection 36, no. 4 (October 2001): 537–46. http://dx.doi.org/10.1051/radiopro:2001107.
Full textLamart, S., L. De Carlan, E. Blanchardon, and D. Franck. "Développements apportés au logiciel OEDIPE de simulation de mesures anthroporadiamétriques pour la prise en compte des données biocinétiques dans la modélisation de la contamination interne." Radioprotection 43, no. 2 (April 2008): 213–23. http://dx.doi.org/10.1051/radiopro:2007055.
Full textDissertations / Theses on the topic "Safety logiciel"
Sun, Yanjun. "Consolidation de validation fonctionnelle de systèmes critiques à l'aide de model checking : application au contrôle commande de centrales nucléaires." Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0047.
Full textThe verification and validation of safety-critical real-time system are subject to stringent standards and certifications. Recent progress in model-based system engineering should be applied to such systems since it allows early detection of defects and formal verification techniques. This thesis proposes a model-based testing (MBT) methodology dedicated to functional validation of safety-critical real-time systems. The method is directed by the structural coverage of the Lustre model co-simulated with tje physical process and also by the functional requirements. It relies on a repetitive use of a model checker to generate coverage-based open-loop test sequences. We also propose a refinement technique of progressively adding environment constraints during test generation. The refinement is expected to support the passage from coverage-based open-loop test sequence to functional requirements-based closed-loop test case. Our methodology also considers the state explosion problem of a model checker and proposes a heuristic called hybrid verification combining model checking and simulation
Mariano, Georges. "Evaluation de logiciels critiques développés par la méthode B : une approche quantitative." Valenciennes, 1997. https://ged.uphf.fr/nuxeo/site/esupversions/823185e9-e82a-44fc-b3e2-17a0b205165e.
Full textChu, Liu. "Reliability and optimization, application to safety of aircraft structures." Thesis, Rouen, INSA, 2016. http://www.theses.fr/2016ISAM0008/document.
Full textTremendous struggles of researchers in the field of aerodynamic design and aircraft production were made to improve wing airfoil by optimization techniques. The development of computational fluid dynamic (CFD) in computer simulation cuts the expense of aerodynamic experiment while provides convincing results to simulate complicated situation of aircraft. In our work, we chose a special and important part of aircraft, namely, the structure of wing.Reliability based optimization is one of the most appropriate methods for structural design under uncertainties. It struggles to seek for the best compromise between cost and safety while considering system uncertainties by incorporating reliability measures within the optimization. Despite the advantages of reliability based optimization, its application to practical engineering problem is still quite challenging. In our work, uncertainty analysis in numerical simulation is introduced and expressed by probability theory. Monte Carlo simulation as an effective method to propagate the uncertainties in the finite element model of structure is applied to simulate the complicate situations that may occur. To improve efficiency of Monte Carlo simulation in sampling process, Latin Hypercube sampling is performed. However, the huge database of sampling is difficult to provide explicit evaluation of reliability. Polynomial chaos expansion is presented and discussed. Kriging model as a surrogate model play an important role in the reliability analysis.Traditional methods of optimization have disadvantages in unacceptable time-complexity or natural drawbacks of premature convergence because of finding the nearest local optima of low quality. Simulated Annealing is a local search-based heuristic, Genetic Algorithm draws inspiration from the principles and mechanisms of natural selection, that makes us capable of escaping from being trapped into a local optimum. In reliability based design optimization, these two methods were performed as the procedure of optimization. The loop of reliability analysis is running in surrogate model
Pandya, Nishant. "Analyse de sensibilité paramétrique d’un outil de modélisation des conséquences de scénarios d’accidents. Application à la dispersion atmosphérique de rejets avec le logiciel Phast." Thesis, Toulouse, INPT, 2009. http://www.theses.fr/2009INPT031G/document.
Full textWe have undertaken a parametric sensitivity analysis of the Phast software tool’s models for atmospheric dispersion of toxic and/or inflammable gases. We have coupled Phast with the sensitivity analysis tool SimLab, and have automated the execution of a large number of simulations while varying simultaneously selected model parameters. The global sensitivity analysis method used, E-FAST, is based on analysis of the variance of model outputs, and allows us to estimate sensitivity indices. We have studied continuous release scenarios for six different products (nitric oxide, ammonia, chlorine, nitrogen, n-hexane and hydrogen fluoride), which were chosen to cover a wide range of physical characteristics and storage conditions. Our analysis of Phast’s Unified Dispersion Model comprises two phases: a screening phase which allows the sensitivity of a wide range of parameters to be compared, followed by a phase focusing on the sensitivity of internal model parameters (excluding weather and source term variables), over a wide input range. For each product, we have broken down base-case scenarios into a number of sub-scenarios corresponding to different release conditions. This work has allowed us to rank model parameters according to their influence on the variability of a number of model outputs. It also includes a per-product comparative analysis indicating, for each release condition studied, which parameters have the most influence on the outputs. In the final part of the work, we have analyzed the local sensitivity of these parameters in a narrow range around their default values
Gobillot, Nicolas. "Validation d’architectures temps-réel pour la robotique autonome." Thesis, Toulouse, ISAE, 2016. http://www.theses.fr/2016ESAE0006/document.
Full textA robot is a complex system combining hardware and software parts. In order to simplify the robot design, the whole system is split in several separated modules. However, the complexity of the functional and temporal validation to improve the safety counterweights the robot design simplicity. We can find scheduling analysis tools for task-based software. These tools are used to check and validate the schedulability of the tasks involved in a software, run on a specific hardware. However, these methods considers the tasks as monolithic entities, without taking into account their internal structure. The resulting analyses may be too much pessimistic and therefore not applicable to robotic applications. In this work, we have modeled the internal structure of the tasks as state-machines and used these state-machines into the schedulability analysis in order to improve the analysis precision. Moreover, the tools developed during this work have been tested on real robotic use-cases
Louis, Christophe. "La protection des logiciels : une solution pour ordinateurs personnels utilisant la carte a micro-calculateur." Paris 6, 1988. http://www.theses.fr/1988PA066373.
Full textGodot, Jean. "ALEBAS : une méthodologie de développement et d'analyse de sûreté de fonctionnement des systèmes embarqués." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS057/document.
Full textNowadays, the increasing complexity of embedded systems requires the management, from the first prototypes and software level, of requirements usually handled later even only when passing in production, such as including dependability constraints. We propose a development methodology for embedded software that can meet the needs and constraints of developing this software in the prototyping phase. The flexibility of the methodology ensures better management of recurring changes characterizing the software in the prototyping phase. Also, due to its well-adapted structure, and automated aspect of its integration and implementation, our methodology ensures a significant cost reduction of serialization and implementation of norms such as ISO 26262 or DO-178. To illustrate the results, we apply our methodology and the associated toolchain to an innovative industrial project which consists to robotize a prototype car. The case study focuses on the accelerator function of the prototype
Goutal, Pascale. "Jeux non-coopératifs finis appliqués à la sécurité nucléaire." Paris 6, 1997. http://www.theses.fr/1997PA066362.
Full textSirgabsou, Yandika. "Proposition d’une approche dirigée par les modèles pour la sûreté de fonctionnement logicielle - Application à l'architecture logicielle des véhicules connectés et autonomes." Electronic Thesis or Diss., Toulouse, INSA, 2023. http://www.theses.fr/2023ISAT0062.
Full textIn the context of automotive software development, the general problem that motivated this work was the growing complexity of software architectures and the limitations of the current practices in terms of safety analyses. Despite the development of MBSE (Model Based Systems Engineering), these practices are still characterized by the reliance on manual traditional safety analysis techniques such as Fault Tree Analysis (FTA) or Failure Modes and Effect Analysis (FMEA). Although still useful, these techniques fall short when faced with complexity with the possibility of resulting in subjective, inefficient, poor quality and error-prone analyses. Hence, to improve the state of the current practice in the automotive context, our proposal is to apply the Model Based Safety Analysis (MBSA) approach that is a relevant Model Driven Engineering approach applied to safety. However, the review of the current state of the art of current MBSA approaches suggests that most of these approaches are systems oriented and lack clear methodological support. In addition, some of the MBSA approaches (especially those relying on a dedicated model) require deep understanding (in terms of modeling paradigm) and can be challenging to implement in the case of complex systems (limitations of manual modeling). Also in current practices, safety analysis at software level suffers of poor integration with the software development process, which can result in inconsistent safety analyses. To address these issues, the essence of our contribution is to provide a methodology that adapts the concepts, principles, and methods of MBSA for the purpose of improving the practice of software safety analysis, taking into consideration the current state of practices (in the existing software development process).Our first contribution consists of a methodology covering all the steps required to perform safety analysis on automotive software architectures using the model-based approach while addressing the challenges presented by the lack of inadequate inputs brought by the use of document-centric artifact in some parts of the software engineering process. Through this contribution, we propose a step-by-step methodology for defining the safety analysis context, constructing the dysfunctional architecture, and using it for safety analyses relying on a dedicated model approach.The second proposal, also methodological, aims to address some challenges related to complexity brought by the limitations of a dedicated model approach. It consists of using software fault patterns based on ISO 26262 software fault templates to ease the construction of the dysfunctional model. Through this proposal, prototypes of common software fault patterns are developed and reused to build the dysfunctional model.The third contribution, still undergoing development, is a tooling proposal to partially automated and ease the construction of software component’s fault behavior and propagation through functional to dysfunctional logic translation. It aims to ensure a better consistency of software safety analyses with the software development process constantly with ISO 26262 recommendations
Moy, Yannick. "Automatic modular static safety checking for C programs." Paris 11, 2009. http://www.theses.fr/2009PA112001.
Full textIn this PhD thesis, we present automatic and modular solutions to the three main problems that come up when applying deductive verification techniques to C programs, in order to prove the absence of security flaws that exploit memory corruption. These problems are the generation of logical annotations, memory separation and the treatment of unions and casts. Deductive verification relies on the presence of logical annotations in programs. In practice, it is not possible to add all annotations manually. We propose a technique to generate such annotations based on abstract interpretation, weakest precondition calculus and quantifier elimination. When programs contain pointers, deductive verification is precise enough only if memory regions pointed-to are disjoint. We propose a technique to separate memory regions based on a contextual version of Steensgaard's alias analysis, whose correction is guaranteed by generating additional preconditions. When programs contain unions and casts, the usual hypothesis made in deductive verification that fields of structures are separated is not valid anymore. We propose a classification of unions and casts, as well as a combination of typed memory model and byte-level memory model, that validates the usual hypothesis of field separation. We have implemented these techniques in Frama-C and Why platforms. By applying them to the verification of existing libraries for strings, we both managed to find memory safety bugs in the original versions and to check the safety of corrected versions of the same libraries
Books on the topic "Safety logiciel"
Developing safety systems: A guide using Ada. New York: Prentice Hall, 1991.
Find full textTransport, European Commission Directorate-General, ed. Comfortable: Comfort - advanced benefits for logical VTS equipment. Luxembourg: Office for Official Publications of the European Communities, 1999.
Find full text1946-, Voges U., ed. Computer safety, reliability and security: 20th international conference, SAFECOMP 2001, Budapest, Hungary, September 26-28, 2001 : proceedings. Berlin: Springer, 2001.
Find full textThe e-policy handbook: Rules and best practices to safely manage your company's e-mail, blogs, social networking, and other electronic communication tools. 2nd ed. New York: American Management Association, 2009.
Find full textPham, Hoang. System Software Reliability. Springer, 2010.
Find full textPham, Hoang. System Software Reliability. Springer London, Limited, 2007.
Find full textSystem Software Reliability (Springer Series in Reliability Engineering). Springer, 2006.
Find full textAkimkin, Vasily G., ed. Control and prevention of infections associated with health care (HAIs-2020). Central Research Institute for Epidemiology, 2020. http://dx.doi.org/10.36233/978-5-6045286-1-7.
Full textLicensing Issues Associated With the Use of Computers in the Nuclear Industry (Nuclear Science and Technology (European Comm Info Serv)). European Communities, 1988.
Find full textDavim, J. Paulo, Kaushik Kumar, and Chikesh Ranjan. Understanding CATIA: A Tutorial Approach. Taylor & Francis Group, 2021.
Find full textBook chapters on the topic "Safety logiciel"
Platzer, André. "Safety & Contracts." In Logical Foundations of Cyber-Physical Systems, 95–136. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-63588-0_4.
Full textBarthe, Gilles, Juan Manuel Crespo, and César Kunz. "Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification." In Logical Foundations of Computer Science, 29–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35722-0_3.
Full textSaglietti, Francesca. "Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets." In Computer Safety, Reliability and Security, 319–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49646-7_25.
Full textSpeiser, Kilian, Kepeng Hong, and Jochen Teizer. "Enhancing the Realism of Virtual Construction Safety Training: Integration of Real-Time Location Systems for Real-World Hazard Simulations." In CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality, 155–66. Florence: Firenze University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0289-3.15.
Full textSpeiser, Kilian, Kepeng Hong, and Jochen Teizer. "Enhancing the Realism of Virtual Construction Safety Training: Integration of Real-Time Location Systems for Real-World Hazard Simulations." In CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality, 155–66. Florence: Firenze University Press, 2023. http://dx.doi.org/10.36253/10.36253/979-12-215-0289-3.15.
Full textKvassay, M., E. Zaitseva, J. Kostolny, and V. Levashenko. "Reliability analysis of noncoherent systems based on logical differential calculus." In Risk, Reliability and Safety: Innovating Theory and Practice, 1367–74. Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742: CRC Press, 2016. http://dx.doi.org/10.1201/9781315374987-205.
Full textClote, Peter. "A safe recursion scheme for exponential time." In Logical Foundations of Computer Science, 44–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63045-7_5.
Full textCholvy, Laurence, Robert Demolombe, and Andrew Jones. "Reasoning about the safety of information: from logical formalization to operational definition." In Lecture Notes in Computer Science, 488–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58495-1_49.
Full textBlicha, Martin, Konstantin Britikov, and Natasha Sharygina. "The Golem Horn Solver." In Computer Aided Verification, 209–23. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37703-7_10.
Full textCassano, Valentín, Thomas S. E. Maibaum, and Silviya Grigorova. "A (Proto) Logical Basis for the Notion of a Structured Argument in a Safety Case." In Formal Methods and Software Engineering, 1–17. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47846-3_1.
Full textConference papers on the topic "Safety logiciel"
Yang, Wen-Chi, Giuseppe Marra, Gavin Rens, and Luc De Raedt. "Safe Reinforcement Learning via Probabilistic Logic Shields." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/637.
Full textFengfeng, Wu, Jia Song, Yang Kai, Zhao Xiongbo, and Wu Guirong. "Design of RapidIO logical core based on safety arbitration mechanisms." In Electronics (PrimeAsia). IEEE, 2010. http://dx.doi.org/10.1109/primeasia.2010.5604940.
Full text"Safety and Security in Networked Robotic Systems Via Logical Consensus." In International Workshop on “Networked embedded and control system technologies: European and Russian R&D cooperation”. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002278600000000.
Full textCreese, Sadie, Michael H. Goldsmith, and Adedayo O. Adetoye. "A logical high-level framework for Critical Infrastructure resilience and risk assessment." In 2011 International Workshop on Cyberspace Safety and Security (CSS). IEEE, 2011. http://dx.doi.org/10.1109/css.2011.6058564.
Full textKammuller, Florian, and Manfred Kerber. "Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling." In 2016 IEEE Security and Privacy Workshops (SPW). IEEE, 2016. http://dx.doi.org/10.1109/spw.2016.47.
Full textAyestaran, Iban, Carlos F. Nicolas, Jon Perez, and Peter Puschner. "Modeling logical execution time based safety-critical embedded systems in SystemC." In 2014 3rd Mediterranean Conference on Embedded Computing (MECO). IEEE, 2014. http://dx.doi.org/10.1109/meco.2014.6862662.
Full textGiunchiglia, Eleonora, Mihaela Catalina Stoian, and Thomas Lukasiewicz. "Deep Learning with Logical Constraints." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/767.
Full textColeman, James R. "A Logical Approach to Designing Safety Test Plans for Space Nuclear Systems." In SPACE TECHNOLOGY AND APPLICATIONS INTERNAT.FORUM-STAIF 2004: Conf.on Thermophys.in Microgravity; Commercial/Civil Next Gen.Space Transp.; 21st Symp.Space Nuclear Power & Propulsion; Human Space Explor.; Space Colonization; New Frontiers & Future Concepts. AIP, 2004. http://dx.doi.org/10.1063/1.1649590.
Full textLu, Yanchun, Ting Lei, Yujie Liu, Hongqi Yang, and Ning Hu. "Research on the logical relation of safety work items in GJB 900A-2012." In 2023 5th International Conference on System Reliability and Safety Engineering (SRSE). IEEE, 2023. http://dx.doi.org/10.1109/srse59585.2023.10336061.
Full textRusso, F., and C. Rindone. "Safety of users in road evacuation: the logical framework approach in evacuation planning." In URBAN TRANSPORT 2008. Southampton, UK: WIT Press, 2008. http://dx.doi.org/10.2495/ut080721.
Full textReports on the topic "Safety logiciel"
Zimmerman and Chen. L51769 Limit States and Reliability-Based Pipeline Design. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), June 1997. http://dx.doi.org/10.55274/r0010325.
Full text