Tesis sobre el tema "Protocole des Applications à contraintes"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Protocole des Applications à contraintes".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Tfaily, Souayed Rima. "Les applications des environnements virtuels distribués à retour d'effort : contraintes et solutions sur un réseau IP". Troyes, 2005. http://www.theses.fr/2005TROY0002.
Texto completoRecently, as an increasing number of haptic devices became commercially available, more and more distributed virtual reality systems are integrated with haptic interfaces. However, there are technical difficulties in providing real-time haptic interaction in distributed virtual environments and these problems persist. Whenever virtual environments communicate via the network, unpredictable time delay and delay variation, packet loss, etc. Affects the performance of haptic interaction. Despite that many research works have been conducted to find a way of establishing multimodal interaction over networks, studies on the performance of DHVEs on IP networks have not been fully investigated and the literature on this topic is limited. In addition, Quality of Service (QoS) requirements of force feedback have not been clearly determined and solutions to deal with the network impairments are scarce. In this dissertation, I focus on determining the QoS requirements for conveying the force feedback over IP networks and for determining the upper thresholds that the haptic data should request. To do so, subjective and objective assessments have been conducted on two experimental platforms: Fast Ethernet Network and Network Impairment Emulation platforms, installed at Queen’s University of Belfast. The QoS requirements for DHVE applications cannot be satisfied in best effort service as the experiments report. Therefore, I applied differentiated Services (DiffServ) on network nodes and I determined which policies are appropriate to improve the DHVE application performance. However, DiffServ is insufficient to adapt the DHVE requirements to the dynamic network conditions; Thus, I incorporated adaptive control strategies into the haptic communication system. Control strategies are to adapt the haptic communication according to the network conditions. These techniques have been simulated on MatLab
Bouzefrane, Samia. "Etude temporelle des applications temps réel distribuées à contraintes strictes basée sur une analyse d'ordonnançabilité". Poitiers, 1998. http://www.theses.fr/1998POIT2254.
Texto completoBursuc, Sergiu. "Contraintes de déductibilité dans une algèbre quotient : réduction de modèles et applications à la sécurité". Cachan, Ecole normale supérieure, 2009. http://www.theses.fr/2009DENS0055.
Texto completoTo enable formal and automated analysis of security protocols, one has to abstract implementations of cryptographic primitives by terms in a given algebra. However, the algebra can not be free, as cryptographic primitives have algebraic properties that are either relevant to their specification or else they can be simply observed in implementations at hand. These properties are sometimes essential for the execution of the protocol, but they also open the possibility for an attack, as they give to an intruder the means to deduce new information from the messages that he intercepts over the network. In consequence, there was much work over the last few years towards enriching the Dolev-Yao model, originally based on a free algebra, with algebraic properties, modelled by equational theories. In this thesis, driven by both practical and theoretical interests, we propose general decision procedures for the insecurity of protocols, that can be applied to several classes of equational theories
Makarem, Nabil. "Performance evaluation and improvement of congestion control of the constrained application protocol for the Internet-of-things". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS289.
Texto completoThe Constrained Application Protocol (CoAP) is a lightweight core protocol designed by the Internet Engineering Task Force (IETF) used for communication between devices in the Internet of Things (IoT). In this research work, we propose new exact mathematical models to analyze the performance of CoAP in lossy IoT networks. This study provides insights about improving CoAP congestion control in such networks and highlights the properties -- including the limitations -- of CoAP. Besides, we show that the simple control mechanism reduces significantly CoAP performance especially in terms of bandwidth utilization since it prevents the protocol from acting efficiently during congestion periods. We then propose new improvements in order to enhance the trade-off between reliability and goodput while keeping the algorithms reasonably simple for constrained devices. First, we optimize further the estimation procedure of the retransmission timeout in order to enhance congestion detection. Timeouts are the only indicator used in CoAP to detect losses, and losses are used as a strong indicator to detect congestion. Second, we replace the backoff algorithm by "real" congestion control algorithms inspired from the well-known Additive Increase Multiplicative Decrease technique and a recent measurement-based congestion control called BBR. Our analysis using both our simulator and Contiki/Cooja environment show that the rate-based approach outperforms the backoff-based approach. Moreover, all the results show that our algorithms achieve a much better tradeoff between goodput, reliability and overhead
Avanesov, Tigran. "Résolution de contraintes de déductibilité : application à la composition de services Web sécurisés". Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00641237.
Texto completoOlarte, Carlos. "Programmation Concurrent par Contraintes pour Vérifier un Protocole de Sécurité". Phd thesis, Ecole Polytechnique X, 2009. http://tel.archives-ouvertes.fr/tel-00430446.
Texto completoSiafa, Amine. "Protocole multipoint fiable et ordonné pour applications coopératives asynchrones". Chambéry, 1998. http://www.theses.fr/1998CHAMS024.
Texto completoPeng, Shen. "Optimisation stochastique avec contraintes en probabilités et applications". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLS153/document.
Texto completoChance constrained optimization is a natural and widely used approaches to provide profitable and reliable decisions under uncertainty. And the topics around the theory and applications of chance constrained problems are interesting and attractive. However, there are still some important issues requiring non-trivial efforts to solve. In view of this, we will systematically investigate chance constrained problems from the following perspectives. As the basis for chance constrained problems, we first review some main research results about chance constraints in three perspectives: convexity of chance constraints, reformulations and approximations for chance constraints and distributionally robust chance constraints. For stochastic geometric programs, we formulate consider a joint rectangular geometric chance constrained program. With elliptically distributed and pairwise independent assumptions for stochastic parameters, we derive a reformulation of the joint rectangular geometric chance constrained programs. As the reformulation is not convex, we propose new convex approximations based on the variable transformation together with piecewise linear approximation methods. Our numerical results show that our approximations are asymptotically tight. When the probability distributions are not known in advance or the reformulation for chance constraints is hard to obtain, bounds on chance constraints can be very useful. Therefore, we develop four upper bounds for individual and joint chance constraints with independent matrix vector rows. Based on the one-side Chebyshev inequality, Chernoff inequality, Bernstein inequality and Hoeffding inequality, we propose deterministic approximations for chance constraints. In addition, various sufficient conditions under which the aforementioned approximations are convex and tractable are derived. To reduce further computational complexity, we reformulate the approximations as tractable convex optimization problems based on piecewise linear and tangent approximations. Finally, based on randomly generated data, numerical experiments are discussed in order to identify the tight deterministic approximations. In some complex systems, the distribution of the random parameters is only known partially. To deal with the complex uncertainties in terms of the distribution and sample data, we propose a data-driven mixture distribution based uncertainty set. The data-driven mixture distribution based uncertainty set is constructed from the perspective of simultaneously estimating higher order moments. Then, with the mixture distribution based uncertainty set, we derive a reformulation of the data-driven robust chance constrained problem. As the reformulation is not a convex program, we propose new and tight convex approximations based on the piecewise linear approximation method under certain conditions. For the general case, we propose a DC approximation to derive an upper bound and a relaxed convex approximation to derive a lower bound for the optimal value of the original problem, respectively. We also establish the theoretical foundation for these approximations. Finally, simulation experiments are carried out to show that the proposed approximations are practical and efficient. We consider a stochastic n-player non-cooperative game. When the strategy set of each player contains a set of stochastic linear constraints, we model the stochastic linear constraints of each player as a joint chance constraint. For each player, we assume that the row vectors of the matrix defining the stochastic constraints are pairwise independent. Then, we formulate the chance constraints with the viewpoints of normal distribution, elliptical distribution and distributionally robustness, respectively. Under certain conditions, we show the existence of a Nash equilibrium for the stochastic game
LAUNAY-ILIADIS, MARIE-CAMILLE. "Elaboration d'un protocole optimal en pharmacocinetique clinique : applications a des anticancereux". Aix-Marseille 2, 1989. http://www.theses.fr/1989AIX22980.
Texto completoDucasse, Jean-Marie. "Randonnée pédestre et en raquettes (en moyenne montagne) : proposition d'un protocole d'étude des contraintes cardio-respiratoires en situation". Bordeaux 2, 1999. http://www.theses.fr/1999BOR2M153.
Texto completoCiuca, Marian. "Estimation non-paramétrique sous contraintes. Applications en finance stochastique". Aix-Marseille 1, 2003. http://www.theses.fr/2003AIX11018.
Texto completoIn financial mathematics, when using the celebrated Black-Scholes formula one can be asked to nonparametrically estimate the volatility function in a one-side manner: the estimator has to be always grater than, or equal to, the estimated function. In the first part, working over Besov smoothenss classes, we construct wavelet linear and non-linear estimators of the diffusion coefficient of a diffusion process, using the sup-norm as a quality criterion for an estimator, and compute their convergence rates, in a minimax, and respectively adaptive, context; then we construct an asymptotically one-sided diffusion coefficient estimator and compute its minimax convergence rate. In the second part we study the one-side estimation problem in the Gaussian white noise model, and exhibit the minimax convergence rate for this constrained nonparametric estimation problem, proving lower and upper bound results. In the third part, we prove that our volatility estimators yield Black-Scholes asymptotically replicating, super-replicating and sub-replicating strategies. The last part presents our estimators from an applied point of view, by means of numerical simulations
Talbot, Jean-Marc. "Contraintes ensemblistes définies et co-définies : extensions et applications". Lille 1, 1998. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/1998/50376-1998-367.pdf.
Texto completoLe, Guyader Carole. "Imagerie Mathématique: segmentation sous contraintes géométriques ~ Théorie et Applications". Phd thesis, INSA de Rouen, 2004. http://tel.archives-ouvertes.fr/tel-00009036.
Texto completoPour pallier ces difficultés, nous proposons ici des modèles de segmentation intégrant des contraintes géométriques et satisfaisant les critères classiques de détection avec en particulier la régularité sur le contour que cela implique.
Le, Guyader Carole. "Imagerie mathématique : segmentation sous contraintes géométriques : théorie et applications". Phd thesis, Rouen, INSA, 2004. http://www.theses.fr/2004ISAM0016.
Texto completoVila, Jean. "Influence du protocole d'établissement des contraintes thermodynamiques sur les performances d'un réacteur solide-gaz de pompes à chaleur chimiques". Perpignan, 1991. http://www.theses.fr/1991PERP0108.
Texto completoAgha, Abdel Kader. "Régression et analyse canonique sous contraintes linéaires, algorithmes et applications". Paris 9, 1991. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1991PA090016.
Texto completoDimassi, Jamil. "Une méthode multi-démarches pour la conception des applications de e-commerce". Paris 1, 2004. http://www.theses.fr/2004PA010010.
Texto completoTschumperlé, David. "Régularisation d'Images Multivaluées par EDP et Applications". Phd thesis, Université de Nice Sophia-Antipolis, 2002. http://tel.archives-ouvertes.fr/tel-00002396.
Texto completod'images multivaluées, et leurs applications à une large classe de
problèmes d'intérêts. L'étude et la comparaison des méthodes
existantes nous permet à la fois de proposer un cadre mathématique
commun mieux adapté aux interprétations géométriques locales de
ces EDP, mais aussi de concevoir des schémas numériques efficaces
pour leur mise en oeuvre.
Nous développons de cette façon une nouvelle approche de régularisation multivaluée vérifiant certaines propriétés géométriques locales importantes, qui peut être utilisée dans de nombreuses applications différentes. Nous abordons ensuite le problème lié à la régularisation de données multivaluées
contraintes. Un formalisme variationel est proposé afin de traiter
dans un cadre unifié, des données de direction comme les champs de
vecteurs unitaires, de matrices de rotation, de tenseurs de diffusion etc.
Les solutions apportées sont analysées et utilisées avec succès pour résoudre de nombreux problèmes, notamment la régularisation et l'interpolation d'images couleurs, la visualisation de flots, la régularisation de mouvements rigides estimés à partir de
séquences vidéos, et l'aide à la reconstruction de réseaux cohérents de fibres dans la matière blanche du cerveau, à partir de la régularisation d'images d'IRM de diffusion.
Gallien, Benjamin. "Contraintes thermomécaniques et dislocations dans les lingots de silicium pour applications photovoltaïques". Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENI027/document.
Texto completoSIMaP-EPM laboratory of Grenoble and INES institute of Chambery have both financed this thesis which investigates the effect of thermo-mechanical stresses on the crystal quality during production of silicon ingots for photovoltaic applications. This work begins by showing how photovoltaic industry makes solar panels and the influence of dislocations (defects induced by stresses) on the conversion efficiency. Bibliographic review is also performed in order to describe physical and numerical models of dislocation motion and their multiplication in silicon. Several characterization methods of the dislocation density at the surface of a sample are also presented in the first part of this work.In the second part of this manuscript, comparative study of different quick characterization methods is done in order to show their strength and weaknesses. Therefore, a sample, which is wide, not containing grain boundaries, and having areas of high and low dislocation density, is used as reference sample for the comparison. The first characterization technique studied in this work is the “accurate method” consisting in manually counting the dislocations at the surface of the sample in order to have a precise characterization of dislocation density. The “INES method” uses numerical treatment of SEM pictures to count dislocations. The “Ganapati method” links the grey scale of a sample picture taken with a scanner and the dislocation density. Finally, the “PVScan method”, using the eponymous device, uses diffusion of a laser beam on the surface of the sample for characterization. This comparative study underlines the best applications for each method and which questions should be thought about before performing dislocation characterization.The third part of this work is intended to build two numerical simulations using Comsol commercial software in order to predict dislocation density in silicon ingot at the end of its production. Therefore, Alexander and Haasen model, describing dislocation density and plastic relaxation rate, is implemented into the software and coupled with the thermo-mechanical stress calculation. In the first model, named “continuous evolution”, the entire ingot is taken into account (liquid and solid parts) and, during solving of this numerical simulation, temperature changes continuously. In the second model, named “step by step” only the solid part of the ingot is taken into account with new geometry and new temperature at each step. Both of these models are compared to numerical simulations performed by Japanese and Norwegian teams. Results of the first one are also compared to the experimental characterization of a sample. Thus, this part shows the pertinence of using commercial software for the prediction of dislocation density in a silicon ingot at the end of its production. Its use is simple and shows good adaptability to different furnace geometries and thermal fields.In the last part, ingot/crucible attachment is studied because it creates high stresses and then dislocations in the crystal. This problem is also solved by numerical simulation using Comsol software. Therefore, a physical model is created: the J-integral is used to estimate elastic energy at the attachment area and then this value is compared to ingot/crucible adhesion energy. This model is implemented into the software and the results are compared to an experiment realized during a previous thesis. This numerical simulation is also applied to two attachment configurations of a silicon ingot in order to study the attachment duration, the localization and the size of crystal area impacted by plasticity
Gryson, Alexis. "Minimisation d'énergie sous contraintes : applications en algèbre linéaire et en contrôle linéaire". Phd thesis, Université des Sciences et Technologie de Lille - Lille I, 2009. http://tel.archives-ouvertes.fr/tel-00424947.
Texto completoGryson, Alexis. "Minimisation d'énergie sous contraintes : applications en algèbre linéaire et en contrôle linéaire". Electronic Thesis or Diss., Lille 1, 2009. http://www.theses.fr/2009LIL10034.
Texto completoThe Zolotarev problem with respect to discrete sets arises naturally to describe both the convergence rate of the ADI method, to compute approximation of various functions of matrices and to quantify the decreasing rate of singular values of structured matrices. Moreover, the theory of model reduction is a key problem in linear control theory, and the quality of the approximation of continuous stationnary linear dynamical system might be predicted with the computation of the solution of a Sylvester equation. Once proved the existence of a minimizer for the third Zolotarev problem with respect to discrete sets, we give the weak asymptotic behaviour of the Zolotarev quantity under some regularity hypothesis. In this purpose, we introduce a problem of energy minimization with constraints in logarithmic potential theory with respect to signed measures. We discuss the accuracy of our results for general discrete sets in the complex plane, and we prove an explicit integral formula in the particular case of two discret subsets of the real axis symmetric with respect to the imaginary axis. Then, the impact of our theoretical results concerning the analysis of the convergence rate of the ADI method applied to solve a Sylvester equation is estimated with various numerical examples after the description of the algorithm which we used to compute the parameters
STEFFAN, LAURENT. "Conception et specification de protocoles de communication pour applications temps reel". Nantes, 1988. http://www.theses.fr/1988NANT2046.
Texto completoLehoux, Vassilissa. "Théorie et applications en ordonnancement : contraintes de ressources et tâches agrégées en catégories". Phd thesis, Université de Grenoble, 2007. http://tel.archives-ouvertes.fr/tel-00997319.
Texto completoFowler, Julian. "Extension réactive de la programmation logique avec contraintes et applications en optimisation combinatoire". Paris 11, 1995. http://www.theses.fr/1995PA112150.
Texto completoThis work presents a constraint logic programming scheme for reactive systems. The hypotheses taken for the proposed extension are presented. Firstly all interaction of the environnement on the system is described by four goal transformations. Secondly a operational model based on the re-use of derivations is proposed. This model is presented formally a combination of basic derivation operations, these operations are prealably defined. The correction and completeness of the model is then proven. An implementation of a simplified version of the model is then described. A comparison is made with some other models for reactive execution before a powerful general scheme for optimisation is exposed. Finally the implementation is evaluated on two applications: a decision support system for a multi-criteria optimisation problem, and a problem of aircraft landing scheduling in a simulated environnement
Marc, Frédéric. "Planification multi-agent sous contraintes dans un contexte dynamique : applications aux simulations aériennes". Paris 6, 2005. http://www.theses.fr/2005PA066101.
Texto completoProst, Rémy. "Contribution à l'élaboration d'algorithmes itératifs discrets super-résolvants de déconvolution avec contraintes applications /". Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37609067t.
Texto completoAl-Ghadi, Musab Qassem. "Approches de tatouage pour l'authentification de l'image dans des applications à contraintes temporelles". Thesis, Brest, 2018. http://www.theses.fr/2018BRES0029/document.
Texto completoIn numerous applications such as those of medical and embedded domains, images authentication requires taking into account time constraints, embedding rate, perceptual quality and robustness against various attacks. Watermarking has been proposed as a complementary approach to cryptography, for improving the security of digital images. Watermarking can be applied either in the spatial domain on the pixels of the image, or in the frequency domain on the coefficient of its transform.In this thesis, the goal is to propose image watermarking approaches that make it possible to ensure high level of imperceptibility and robustness while maintaining a level of computational complexity fitting the requirements of time-constrained applications. The method adopted in this thesis has consisted, on the one hand, to rely on the benefit of zero-watermarking that does not degrade the perceptual quality of image data and has low computational complexity, and on the other hand, to analyze visual characteristics of digital image (characteristics that are correlated to the Human Visual System - HVS) in order to identify the locations the most adapted for embedding the watermark with good level of imperceptibility and robustness. A zero-watermarking has therefore been proposed in this thesis, as well as several watermarking approaches based on the analysis of visual characteristics of image and on artificial intelligence or related techniques. The proposed solutions have been analyzed with respect to imperceptibility, robustness and temporal performance and the results have shown significant improvements in comparison to existing approaches
Tchvagha, Zeine Ahmed. "Contribution à l’optimisation multi-objectifs sous contraintes : applications à la mécanique des structures". Thesis, Normandie, 2018. http://www.theses.fr/2018NORMIR13/document.
Texto completoThe objective of this thesis is the development of multi-objective optimization methods for solving mechanical design problems. Indeed, most of the real problems in the field of mechanical structures have several objectives that are often antagonistic. For example, it is about designing structures by optimizing their weight, their size, and their production costs. The goal of multi-objective optimization methods is the search for compromise solutions between objectives given the impossibility to satisfy all simultaneously. Metaheuristics are optimization methods capable of solving multi-objective optimization problems in a reasonable calculation time without guaranteeing the optimality of the solution (s). In recent years, these algorithms have been successfully applied to solve the problem of structural mechanics. In this thesis, two metaheuristics have been developed for the resolution of multi-objective optimization problems in general and of mechanical structures design in particular. The first algorithm called MOBSA used the crossover and mutation operators of the BSA algorithm. The second one named NNIA+X is a hybridization of an immune algorithm and three crossover inspired by the original crossover operator of the BSA algorithm. To evaluate the effectiveness and efficiency of these two algorithms, tests on some problems in literature have been made with a comparison with algorithms well known in the field of multi-objective optimization. The comparison results using metrics widely used in the literature have shown that our two algorithms can compete with their predecessors
Lebacque, Lehoux Vassilissa. "Théories et applications en ordonnancement : contraintes de ressources et tâches agrégées en catégories". Grenoble 1, 2007. http://www.theses.fr/2007GRE10128.
Texto completoThis thesis deals with scheduling problems in manufacturing cells. It aims at studying different classical models, analyzing links and differences between those models and the practical associated problems. The approach is to analyze the problems of our indus trial partners, to study the complexity of the problems or the structure of their solution, and to propose exact or approached solution methods. The first axis of this thesis is the study of scheduling problems with inlout resource constraints. The problems considered are robotic flowshops and the new concept of operator non-availability. The second axis concerns scheduling problems with high multiplicity, where parts are aggregated into categories. Complete description of a schedule (i. E. The starting times of the operations) is then only pseudo-polynomial of the size of the input
Cherkaoui, Mohammed. "Comportement thermoélastique global des composites à renforts enrobés : modélisation micromécanique et applications". Metz, 1995. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/1995/Cherkaoui.Mohammed.SMZ9512.pdf.
Texto completoIn many cases, a thin layer of some other elastic phase between an inclusion and the matrix is observed. This interphase may represent a coating of an inclusion in the composite materials, or is created during manufacturing by chemical reaction between the inclusion and the matrix. The presence of this thin layer modifies deeply the load transfers between the matrix and reinforcing fibers. Therefore it has an influence on local fields as well as on the effective properties of composites. The aim of this work is to study the case of coated ellipsoidal inclusions and anisotropic materials. It is based both on integral equation and interfacial operators. We also extend the studies to more general case when the topology of a coated inclusion can be described by two nonhomothetic concentric ellispoidal inclusions. Compared with experimental data and numerical results, the present approach provides reasonably accurate predictions for the effective moduli of composites with thinly coated inclusions
Exposito, Garcia Ernesto José. "Spécification et mise en oeuvre d'un protocole de transport orienté Qualité de Service pour les applications multimédias". Toulouse, INPT, 2003. http://www.theses.fr/2003INPT028H.
Texto completoNGUYEN, VU THIENG AN. "Etude d'un protocole de communication utilisant l'acces multiple par repartition de codes. Applications aux liaisons intra-vehicule". Rennes, INSA, 1997. http://www.theses.fr/1997ISAR0013.
Texto completoZhao, Ting. "Résolution de systèmes polynomiaux paramétriques par radicaux et ses applications géométriques". Paris 6, 2012. http://www.theses.fr/2012PA066131.
Texto completoAdida, Yoan. "Une architecture adaptative pour la gestion des délais des applications multicast". Paris 6, 2003. http://www.theses.fr/2003PA066003.
Texto completoAmaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things". Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.
Texto completoIn Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Herrero, Vinas Pau. "Résolution de contraintes réelles quantifiées en utilisant les intervalles modaux avec applications à l'automatique". Phd thesis, Université d'Angers, 2006. http://tel.archives-ouvertes.fr/tel-00331668.
Texto completoTournoux, Pierre Ugo. "Un protocole de fiabilité basé sur un code à effacement "on-the-fly"". Phd thesis, Université Paul Sabatier - Toulouse III, 2010. http://tel.archives-ouvertes.fr/tel-00547003.
Texto completoPreda, Stere. "Reliable context aware security policy deployment - applications to IPv6 environments". Télécom Bretagne, 2010. http://www.theses.fr/2010TELB0145.
Texto completoOrganization networks are continuously growing so as to sustain the newly created organizational requirements and activities. In parallel, concerns for assets protection are also increasing and security management becomes an ever-changing task for the security officer. In this dissertation we address several key aspects of network security management providing solutions for each aspect:1. Policy deployment based on access control models. Invalid or unusable data of the security policy will have been removed before deploying the abstract policy through a set of algorithms; in this manner, the security officer’s tasks are greatly simplified. 2. Formal algorithm development. The correctness of the algorithms involved in the policy deployment process is of undeniable importance. These algorithms should be proved so that the security officers trust the automatic policy deployment process. 3. Management of contextual requirements and of limited security functionalities. The access control model should be robust enough to cover contextual requirements. The issue is that the security devices are not always able to interpret the contexts. And sometimes, there are security requirements which cannot be deployed given the existing limited security functionalities in the IS. 4. New IPv6 security mechanisms. We have naturally come to consider the design of new IPv6 security mechanisms when dealing with the lack of functionalities in an information system. Our research outlines a comprehensive approach to deploy access control security policies. Actually, it constitutes a step further towards an automatic and reliable management of network security
Feltin, Eric. "Hétéro-épitaxie de Nitrure de Gallium sur substrat de silicium (111) et applications". Nice, 2003. http://www.theses.fr/2003NICE4075.
Texto completoThe work presented in this manuscript deals with the epitaxial growth of gallium nitride on silicon (111) substrate by Metal-Organic Vapor Phase Epitaxy for the optoelectronic applications of III-nitride semiconductors. Cracking of the GaN layers is a consequence of th tensile biaxial stress arising from the epitaxy on silicon. Experimental and theoretical analysis of the thermal and intrinsic stresses give a nes possibilities for the growth of GaN on S1 (111) and a better understanding of the problem of cracks in GaN layers. AIN/GaN superlattices have been used for stress engineering in GaN layers deposited on silicon and to strongly increase the GaN thickness deposited on Si (111) without any crack. InGan on silicon for electronic and optoelectronic applications. Three-dimensional growth process and Epitaxial Lateral Overgrowth (ELO) process have been developed in order to increase the optical and crystalline properties of GaN layers on silicon. For the first time, a decrease of the dislocations density of more than two orders of magnitude has been achieved in fully coalesced layers. The stresses present in ELO layers and cracked layers were explained by theoretical models for the reduction of stress from free surfaces. In agreement with these models, the stress present in GaN on silicon can be relieved and the formation of crack can be avoided by the decrease of the lateral dimensions of the layers
Vali, Ali. "Etude des contraintes résiduelles en usinage assisté par laser". Châtenay-Malabry, Ecole centrale de Paris, 1996. http://www.theses.fr/1996ECAP0466.
Texto completoMeot, Alain. "Explicitation de contraintes de voisinage en analyse multivariée : applications dans le cadre de problématiques agronomiques". Lyon 1, 1992. http://www.theses.fr/1992LYO10241.
Texto completoMangold, Nicolas. "Rhéologie du pergélisol de Mars : applications géomorphologiques et structurales ; conséquences sur l'origine des contraintes compressives". Phd thesis, Université Joseph Fourier (Grenoble), 1997. http://tel.archives-ouvertes.fr/tel-00740850.
Texto completoMangold, Nicolas. "Rhéologie du pergélisol de Mars : applications géomorphologiques et structurales : conséquences sur l'origine des contraintes compressives". Grenoble 1, 1997. http://www.theses.fr/1997GRE10292.
Texto completoCherif, Amina. "Sécurité des RFIDs actifs et applications". Thesis, Limoges, 2021. http://www.theses.fr/2021LIMO0015.
Texto completoOver the 30 last years, active RFID devices have evolved from nodes dedicated to identification to autonomous nodes that, in addition, sense (from environment or other sources) and exchange data. Consequently, the range of their applications has rapidly grown from identification only to monitoring and real time localisation. In recent years, thanks to their advantages, the use of active RFID nodes for mobile data collection has attracted significant attention. However, in most scenarios, these nodes are unattended in an adverse environments, so data must be securely stored and transmitted to prevent attack by active adversaries: even if the nodes are captured, data confidentiality must be ensured. Furthermore, due to the scarce resources available to nodes in terms of energy, storage and/or computation, the used security solution has to be lightweight. This thesis is divided in two parts. In the first, we will study in details the evolution of active RFID nodes and their security. We will then, present, in the second part, a new serverless protocol to enable MDCs (Mobile Data Collectors), such as drones, to collect data from mobile and static Active RFID nodes and then deliver them later to an authorized third party. The whole solution ensures data confidentiality at each step (from the sensing phase, before data collection by the MDC, once data have been collected by MDC, and during final delivery) while fulfilling the lightweight requirements for the resource-limited entities involved. To assess the suitability of the protocol against the performance requirements, we will implement it on the most resource-constrained secure devices to prove its efficiency even in the worst conditions. In addition, to prove the protocol fulfills the security requirements, we will analyze it using security games and we will also formally verify it using the AVISPA and ProVerif tools
Doring, Mathieu. "Développement d'une méthode SPH pour les applications à surface libre en hydrodynamique". Nantes, 2005. http://www.theses.fr/2005NANT2116.
Texto completoRecent development in numerical methods together with the increase of computational power available have allowed simulations of more and more complex flows. However interfacial flows remains a difficult task, especially when breaking, interface reconnection or impacts occurs. Theses difficulties arise mainly from the deformations of the computational domain during the simulation which are badly handled by mesh based Eulerian numerical methods. Smoothed Particle Hydrodynamics, being meshless and Lagrangian allows a simplified management of the interface. In this PhD a SPH based numerical methods has been developed in order to simulate complex free surface flows with impacts and huge breaking. A particular care was taken concerning increasment of the precision; thus different discretization schemes have been tested (Moving Least Square, Renormalisation) as well as boundary conditions (frozen particles, ghost particles) were implemented and tested. Comparison of obtained results with both experimental results and numerical simulations from different numerical methods (Volume of Fluid_Finite volume solvers, spectral potential solver) in development in the Fluid Mechanics Laboratory in a variety of test cases as dam breaking, sloshing in a tank, virtual bassin, impact of solid through free surface shows good agreement, confirming the potential of the SPH method in naval hydrodynamics. The development of an original and new method allowing the obtention of loads on solid boundary made us able to compute loads exerted on an obstacle in a dam breaking test case and to simulate impacts of a wedge in free motion with favourable comparison against experimental dynamic conditions in both configurations. Moreover, a work on parallelization of the code has been carried out, firstly in a data decomposition approach (OpenMP) which we gave up due to its poor efficiency. Then a domain decomposition method was implemented using MPI library and showed good results concerning speed-up in various configurations (PC cluster, SuperComputer) thanks to the overlapping of communication time by standard SPH serial operations. Finally the use of a Verlet like algorithm for neighbor search allowed the optimisation of computationnal efficiency. Thanks to code organisation, three dimensionnal simulations are possible with minimum adaptation
Lee, Hwa-Sun Guyomar Daniel Richard Claude. "Etude et réalisation de sources acoustiques de puissance en composite piézoélectrique 1.3 pour applications thérapeutiques". Villeurbanne : Doc'INSA, 2004. http://docinsa.insa-lyon/these/pont.php?id=lee.
Texto completoSiekkinen, Matti. "Root cause analysis of TCP throughput : methodology, techniques, and applications". Nice, 2006. http://www.theses.fr/2006NICE4037.
Texto completoL'intérêt pour la métrologie de l'Internet s'est beaucoup accru ces dernières années. Ceci est en grande partie dû à la croissance de l'Internet en termes de volumes de trafic et de nombre de machines reliés à l'Internet. Cette évolution a sucité beaucoup d'envies - du point de vue commercial, social, et technique - d'en savoir plus au sujet des utilisateurs et du trafic Internet en général. Malheureusement, il y a peu de connaissances de ce type disponibles aujourd'hui. C'est pourquoi la métrologie de l'Internet est devenue un domaine substantiel de recherches. Cette thèse porte sur l'analyse du trafic TCP. On estime que TCP transporte 90% du trafic Internet, ce qui implique que TCP est une pièce essentielle dans le fonctionnement de l'Internet. La métrique de performance la plus importante pour les applications est, dans la plupart des cas le débit de transmission ; c'est-à-dire la quantité des données transmises par périodes de temps. Notre objectif est l'analyse du débit de transmission de TCP et l'identification des raisons qui empêchent une connexion TCP d'obtenir un débit plus élevé. Ces raisons peuvent être multiples: l'application, le réseau, ou même le protocole TCP lui-même. Cette thèse comporte trois parties. Une première partie sur la méthodologie, une seconde sur techniques d'analyse de TCP, et une dernière qui est une application de ces technique. Dans la première partie, nous présentons notre méthodologie basée sur un système de gestion de base de données (DBMS) pour l'analyse passive de trafic. Nous expliquons notre approche, nommée InTraBase, qui est basée sur un système de gestion de base de données orienté objet. Nous décrivons également notre prototype de cette approche, qui est implémenté au dessus de PostgreSQL, et nous évaluons et optimisons ses performances. Dans la deuxième partie, nous présentons les contributions principales de cette thèse: les techniques d'analyse des causes du débit de transmission TCP observé. Nous présentons les différentes causes potentielles qui peuvent empêcher une connexion TCP d'obtenir un débit plus élevé et nous expliquons en détail les algorithmes que nous avons développé pour détecter ces causes. Etant donné leur hétérogénéité et leur impact sur le débit TCP, nous accordons une grande importance aux applications au dessus de TCP. La troisième partie de cette thèse est une étude de cas du trafic des clients d'un réseau d'accès commercial d'ADSL. L'étude se concentre sur l'analyse des performances des transferts de données d'un point de vue client. Nous démontrons quelques résultats étonnants, tel le fait que les performances globalement faibles des applications pair-à-pair sont dues aux limitations du débit de transmission imposées par ces applications (et non à la congestion dans le réseau)
Belfkih, Abderrahmen. "Contraintes temporelles dans les bases de données de capteurs sans fil". Thesis, Le Havre, 2016. http://www.theses.fr/2016LEHA0014/document.
Texto completoIn this thesis, we are interested in adding real-time constraints in the Wireless Sensor Networks Database (WSNDB). Temporal consistency in WSNDB must be ensured by respecting the transaction deadlines and data temporal validity, so that sensor data reflect the current state of the environment. However, delays of transmission and/or reception in a data collection process can lead to not respect the data temporal validity. A database solution is most appropriate, which should coincide with the traditional database aspects with sensors and their environment. For this purpose, the sensor in WSN is considered as a table in a distributed database, which applied transactions (queries, updates, etc.). Transactions in a WSNDB require modifications to take into account of the continuous datastream and real-time aspects. Our contribution in this thesis focus on three parts: (i) a comparative study of temporal properties between a periodic data collection based on a remote database and query processing approach with WSNDB, (ii) the proposition of a real-time query processing model, (iii) the implementation of a real time WSNDB, based on the techniques described in the second contribution
Lee, Hwa-Sun. "Etude et réalisation de sources acoustiques de puissance en composite piézoélectrique 1. 3 pour applications thérapeutiques". Lyon, INSA, 2003. http://theses.insa-lyon.fr/publication/2003ISAL0006/these.pdf.
Texto completo1-3 piezocomposites were investigated for power ultrasonic applications in the therapeutic medical domain. When the composites were cured at a high temperature, strong induced thermo-mechanical stresses were clearly observed and estimated. At low level, the fabricated composites showed a good reproducibility in terms of sensitivity and bandwidth. When the instantaneous power density is increased with low duty cycle, the best composite configuration shows a 90% efficiency up to 50W/cm². It is made with a Navy III PZT (P189) and an epoxy resin cured at 120°C. Under high average power, the thermal destruction of composites was analyzed. According to the proposed hypothesis, the PZT mechanical loss increase due to the relaxation of the thermo-mechanical stress would be a limiting point in the composite working stability. A transducer made with 50% of PZT P189 and a resin can be operated up to 40W/cm² of average power density at 500kHz without any thermal breakdown
Mansi, Raïd. "Approches hybrides pour des variantes du sac à dos et applications". Valenciennes, 2009. https://ged.uphf.fr/nuxeo/site/esupversions/e60b3c9f-26c2-4c48-87e8-73b2461bb7d0.
Texto completoIn this thesis, we propose new methods hybridizing dynamic programming and integer programming exact methods to solve bilevel knapsack problems. The numerical experiments show that our algorithms are robust and surpass significantly the algorithms of the literature. Iterative hybrid heuristics based on relaxations are designed for solving multiple-choice multidimensional knapsack problem. These heuristics converge theoretically towards an optimal solution of the problem by solving a series of sub problems of small size produced by exploiting the information of relaxations. Our methods are enriched by using fixation and by the addition of cuts and pseudo-cuts induced by local search and relaxations. These added constraints are used to reduce the search space. The results show that the heuristics converge quickly to good solutions and provide 13 new better values from 33 instances of the literature. Lastly, an oscillation strategy combining the mathematical programming and constructive and destructive heuristics is proposed to solve a real problem for the management of disruptions in the air industry. Our approach was ranked second of an international challenge