Contents
Academic literature on the topic 'Techniques d'identification et d'authentification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Techniques d'identification et d'authentification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Techniques d'identification et d'authentification"
Ohmaid, Hicham, S. Eddarouich, A. Bourouhou, and M. Timouya. "Comparison between SVM and KNN classifiers for iris recognition using a new unsupervised neural approach in segmentation." IAES International Journal of Artificial Intelligence (IJ-AI) 9, no. 3 (September 1, 2020): 429. http://dx.doi.org/10.11591/ijai.v9.i3.pp429-438.
Full textLacroix, M., L. Vézina, S. Desjardins, and C. Beaulieu. "Comparaison de techniques d’identification des Erwinia et des Pseudomonas responsables de la pourriture molle." Phytoprotection 76, no. 1 (April 12, 2005): 27–37. http://dx.doi.org/10.7202/706082ar.
Full textDrouin, Patrick. "Une méthodologie d'identification automatique des syntagmes terminologiques : l'apport de la description du non-terme." Meta 42, no. 1 (September 30, 2002): 45–54. http://dx.doi.org/10.7202/002593ar.
Full textEberlin, Philippe. "L’identification acoustique sous-marine des navires-hôpitaux." Revue Internationale de la Croix-Rouge 70, no. 774 (December 1988): 527–41. http://dx.doi.org/10.1017/s0035336100080606.
Full textBocquentin, Marie, Marc Vuillet, Jean-Marie Cariolet, Serge Lhomme, and Youssef Diab. "Vers une meilleure prise en compte des défaillances en cascade au sein des réseaux franciliens interdépendants face aux crues majeures." La Houille Blanche, no. 1 (February 2020): 70–78. http://dx.doi.org/10.1051/lhb/2020009.
Full textMasneuf-Pomarède, Isabelle, and Denis Dubourdieu. "Comparaison de deux techniques d'identification des souches de levures de vinification basées sur le polymorphisme de l'ADN génomique: réaction de polymérisation en chaine (PCR) et analyse des caryotypes (électrophorèse en champ pulsé)." OENO One 28, no. 2 (June 30, 1994): 153. http://dx.doi.org/10.20870/oeno-one.1994.28.2.1150.
Full textAmblard, C., J. C. Boisson, G. Bourdier, D. Fontvieille, X. Gayte, and T. Sime-Ngando. "Écologie microbienne en milieu aquatique : des virus aux protozoaires." Revue des sciences de l'eau 11 (April 12, 2005): 145–62. http://dx.doi.org/10.7202/705336ar.
Full text"Entrée en vigueur de la version amendée de l'Annexe I au Protocole I relative aux moyens techniques d'identification des installations et moyens de transport sanitaires." Revue Internationale de la Croix-Rouge 76, no. 805 (February 1994): 29–30. http://dx.doi.org/10.1017/s0035336100089036.
Full textDissertations / Theses on the topic "Techniques d'identification et d'authentification"
Nastasiu, Dragos-Florin. "Développement de solutions pour l’identification (THID) et l’authentification par des approches non intrusives dans le domaine THz." Electronic Thesis or Diss., Chambéry, 2024. http://www.theses.fr/2024CHAMA007.
Full textTHz imaging is an emerging field since the technological advances in terms of THz radiation emission and detection equipment. The main objective of the thesis is to contribute and to improve THz imaging systems, from image reconstruction and analysis to image classification tasks. In the first part of the thesis, we tackle the amplitude estimation challenge under ideal and multiplicative noise conditions. The multiplicative noise deforms the phase and introduces complex artefacts, such as contour information loss and contrast degradation, that cannot be eliminated using state-of-the-art image reconstruction techniques. In this regard, we introduce five novel reconstruction methods which exploit the phase diagram representation of signals. Two of the methods are based on phase-diagram match filtering to estimate the amplitude in both conditions. Another two methods use the concept of dynamic time warping (DTW) to increase the capability to model the multiplicative type of noise. Lastly, we exploit the dynamic of the phase trajectory described by the curvatures to reconstruct the image. From the large pool of methods, we evaluate throughout the thesis that the curvature-based method efficiently reconstructs the image in both ideal and noisy contexts. After an efficient image reconstruction, the second part of the thesis, we study image analysis and classification methods considering the instabilities of real-world imaging systems, such as translations and rotations. In this sense, we propose to use translation and rotation invariant wavelet packet decompositions, that provide a unique and optimal representation of an image, regardless if the image is translated or rotated. Based on the invariant image representations, novel feature extraction techniques are introduced such as vertical, horizontal, N-directional and N-zonal frameworks. Additionally, two feature structures are introduced and that consider the frequency partitioning of the wavelet decomposition and are adapted to work with Graph Neural Networks (GNNs) and classic ML classifiers such as k-nearest neighbors (k-NN), support vector machine (SVM), etc. Overall, our proposed approaches increase the accuracy of all classifiers
Etrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Full textThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
Dejean, Marie. "Nouvelles techniques de protection et d'authentification d'imprimés de valeur." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0181.
Full textThe security of valuable documents (banknotes) is essential to prevent counterfeiting. In this context, we have developed optical techniques that guarantee protection and authentication of valuable documents by creating visual effects induced by the observer’s motion parallax. In particular, we have focused on multiscopy using a two-dimensional microlens array and micro-images. First, we have developed a protection system by applying spatialen cryption through the use of off-center Fresnel lenses. The micro-images are adapted accordingly, so that a symbol appears at a precise angle. The protection results from the necessary association of both arrays (microlenses and micro-images). Second, we have developed new visual effects, based on non monotonic motion-in-depth. The kinetics of the seeffects is very characteristic and is a way to authenticate the documents thanks to impressive effects. The multiscopic systems scaling leads to a barrier to miniaturizing these systems, since they require a very high resolution for the micro-images. Solutions have been proposed to use accessible resolutions while satisfying the specifications. Because of the encountered technological difficulties, we have also explored a completely different type of system, only based on the phenomenon of specular reflection. Reflective micro-structures create luminous contrast and movement effects also thanks to parallax motion. This technique allows to create simple but very fluid movements unlike microlenses that allow complex movements and objects but jerky trajectories. Finally, we present a comparison between the various technique with the advantages and disadvantages of each one
Dousteyssier, Buvat Hélène. "Sur des techniques déterministes et stochastiques appliquées aux problèmes d'identification." Université Joseph Fourier (Grenoble), 1995. http://tel.archives-ouvertes.fr/tel-00346058.
Full textDousteyssier, Buvat Hélène Blum J. "Sur des techniques déterministes et stochastiques appliquées aux problèmes d'identification." S.l. : Université Grenoble 1, 2008. http://tel.archives-ouvertes.fr/tel-00346058.
Full textDolveck-Guilpart, Bénédicte. "Deux problèmes de représentation et d'identification d'un milieu à partir de sondages." Montpellier 2, 1989. http://www.theses.fr/1989MON20222.
Full textHilal, Alaa. "Système d'identification à partir de l'image d'iris et détermination de la localisation des informations." Thesis, Troyes, 2013. http://www.theses.fr/2013TROY0021/document.
Full textIris identification system is considered among the best biometric technologies. However problems related to the segmentation of the iris and to the normalization of iris templates are generally reported and induce loss of recognition performance. In this work three main contributions are made to the progress of the iris identification system. A new segmentation method is developed. It approximates the outer iris boundary with a circle and segments accurately the inner boundary of the iris by use of an active contour model. Next, a new normalization method is proposed. It leads to a more robust characterization and a better sampling of iris textures compared to traditional normalization methods. Finally using the proposed iris identification system, the location of discriminant characteristics along iris templates is identified. It appears that the most discriminant iris characteristics are located in inner regions of the iris (close to the pupil boundary) and that the discriminant capabilities of these characteristics decreases as outer regions of the iris are considered. The developed segmentation and normalization methods are tested and compared to a reference iris identification system over a database of 2639 iris images. Improvement in recognition performance validates the effectiveness of the proposed system
Poisson, Olivier. "Nouvelles techniques du traitement du signal et d'identification pour l'analyse des perturbations de la tension." Paris 6, 1998. http://www.theses.fr/1998PA066595.
Full textGrivel, Éric. "Contribution au rehaussement du signal de parole par filtrage de Kalman : reformulation de techniques d'identification et modèles harmoniques." Bordeaux 1, 2000. http://www.theses.fr/2000BOR10510.
Full textLampron, Cinthia. "La métaphore comme outil d'identification et de suivi des perceptions subjectives face à une démarche de changement." Sherbrooke : Université de Sherbrooke, 2002.
Find full textBooks on the topic "Techniques d'identification et d'authentification"
Patenaude, Pierre. L'expertise en preuve pénale: Les sciences et techniques modernes d'enquête, de surveillance et d'identification. Cowansville, QC: Éditions Y. Blais, 2003.
Find full textMulti-sensor multi-target data fusion, tracking and identification techniques for guidance and control applications =: Les techniques de poursuite et d'identification multi-cibles á base de fusion multi-sensor appliquées au guidage et au pilotage. Neuilly-sur-Seine: AGARD, 1996.
Find full text