Littérature scientifique sur le sujet « Internet des objets – Informatique »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Internet des objets – Informatique ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Internet des objets – Informatique"
Meiller, Yannick. « La sécurité de l’information devrait être plus présente dans les programmes des écoles de management ». Sécurité et stratégie 32, no 4 (19 mars 2024) : 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Texte intégralDUCHASTEL, Jules. « Discours et informatique : des objets sociologiques ? » Sociologie et sociétés 25, no 2 (30 septembre 2002) : 157–70. http://dx.doi.org/10.7202/001206ar.
Texte intégralVarenne, Franck. « Simulation informatique et pluriformalisation des objets composites ». Philosophia Scientae, no 13-1 (1 avril 2009) : 135–54. http://dx.doi.org/10.4000/philosophiascientiae.79.
Texte intégralFruchier, Olivier, Philippe Egea, Faissal Bakali et Thierry Talbert. « Retour sur le jeu sérieux : Initiation à la sécurité informatique des objets connectés ». J3eA 21 (2022) : 2008. http://dx.doi.org/10.1051/j3ea/20222008.
Texte intégralGAZEL, Hervé. « G2I : géographie, informatique et internet ». Ingénierie des systèmes d'information 22, no 5 (28 mai 2017) : 127–43. http://dx.doi.org/10.3166/isi.22.5.127-143.
Texte intégralSantolini, Arnaud, et Agnès Danis. « Le tutorat des objets connectés : modélisation informatique du conflit forme couleur ». Enfance N°3, no 3 (2019) : 375. http://dx.doi.org/10.3917/enf2.193.0375.
Texte intégralPierrel, Jean-Marie. « Un ensemble de ressources de référence pour l’étude du français : tlfi, frantext et le logiciel stella ». Revue québécoise de linguistique 32, no 1 (20 février 2006) : 155–76. http://dx.doi.org/10.7202/012248ar.
Texte intégralBroisin, Julien, et Philippe Vidal. « Un environnement informatique pour l’apprentissage humain au service de la virtualisation des objets pédagogiques ». Sciences et Technologies de l'Information et de la Communication pour l'Éducation et la Formation 12, no 1 (2005) : 177–204. http://dx.doi.org/10.3406/stice.2005.914.
Texte intégralVandenbunder, B. « Nouveaux objets, nouveaux acteurs, nouveau enjeux éthiques : les interfaces entre biologie, nanotechnologie et informatique ». Éthique & ; Santé 7, no 1 (mars 2010) : 18–23. http://dx.doi.org/10.1016/j.etiqe.2009.12.001.
Texte intégralVaillant, Sylvain. « Le Certificat Informatique et Internet : toute une expérience ». Questions vives recherches en éducation, Vol.7 n°17 (15 octobre 2012) : 171–74. http://dx.doi.org/10.4000/questionsvives.1053.
Texte intégralThèses sur le sujet "Internet des objets – Informatique"
Gyrard, Amélie. « Concevoir des applications internet des objets sémantiques ». Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0018.
Texte intégralAccording to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Gyrard, Amélie. « Concevoir des applications internet des objets sémantiques ». Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0018/document.
Texte intégralAccording to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Hachem, Sara. « Middleware pour l'Internet des Objets Intelligents ». Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2014. http://tel.archives-ouvertes.fr/tel-00960026.
Texte intégralMebrek, Adila. « Fog Computing pour l’Internet des objets ». Thesis, Troyes, 2020. http://www.theses.fr/2020TROY0028.
Texte intégralFog computing is a promising approach in the context of the Internet of Things (IoT) as it provides functionality and resources at the edge of the network, closer to end users. This thesis studies the performance of fog computing in the context of latency sensitive IoT applications. The first issue addressed is the mathematical modeling of an IoT-fogcloud system, and the performance metrics of the system in terms of energy consumed and latency. This modeling will then allow us to propose various effective strategies for content distribution and resource allocation in the fog and the cloud. The second issue addressed in this thesis concerns the distribution of content and object data in fog / cloud systems. In order to simultaneously optimize offloading and system resource allocation decisions, we distinguish between two types of IoT applications: (1) IoT applications with static content or with infrequent updates; and (2) IoT applications with dynamic content. For each type of application, we study the problem of offloading IoT requests in the fog. We focus on load balancing issues to minimize latency and the total power consumed by the system
Bouchaud, François. « Analyse forensique des écosystèmes intelligents communicants de l'internet des objets ». Thesis, Lille, 2021. http://www.theses.fr/2021LILUI014.
Texte intégralWith the development of the Internet of Things, searching for data in a digital environment is an increasingly difficult task for the forensic investigator. It is a real challenge, especially given the heterogeneity of the connected objects. There is a lack of standardization in communication architectures and data management policies. It is accompanied by dependencies between connected ecosystems, especially through hidden links and fragmented information. In this thesis, we suggest adjusting the traditional approach of digital investigation to the constraints of the Internet of Things. We develop methodologies and tools to understand and analyze the connected environment. We assume that the crime scene is a connected whole and not an aggregate of independent digital objects. It contains key data for understanding and contextualizing a past event or phenomenon as evidence for the criminal trial. Digital forensics is considered to be the og extit{application of science to the identification, collection, examination, and analysis, of data while preserving the integrity of the information and maintaining a strict chain of custody for the data fg~ (National Institute of Standards and Technology). Faced with a crime scene, the investigator seeks to understand the criminal event. He examines the data stored in the physical medium and/or in a remote part of the cloud. Our work develops a process of rapid identification of the phenomenon according to four phases: detection, localization, object recognition and information crosschecking. It is enriched with radio signature search tools~: single-sensor and multi-sensor mesh network. This approach is built around the problem of apprehending a multiform connected environment, containing devices that are not always visible or identifiable during a field approach. We integrate in our study the strategy of equipment collection. The challenge lies in the ability to extract one or more connected objects, without compromising the stored data, to place them in a controlled and secure environment. The object is maintained in a state that guarantees the non-alteration or loss of data. The study includes a first phase of understanding the physical environment and dependencies. It seeks to determine the mechanisms of information migration to online platforms and to isolate groups of objects by intelligently breaking the connections. Devices are extracted, then packaged and sealed according to their technical characteristics and the connected infrastructure. We then deepen the exploitation of the information collected using forensic methods. The data is then analyzed according to temporal, spatial and contextual axes. We also propose a classification and a prioritization of the connected structure according to the characteristics of the desired data. The work gives a reading of the life cycle of the data within the Internet of Things infrastructure. In a prospective approach, we deepen the questions of the fine identification of the connected object according to these hardware and software characteristics. The acoustic signature of electronics appears as a relevant physical property in the study of equipment. This feature completes our range of tools in the identification of connected objects
Jallouli, Ons. « Chaos-based security under real-time and energy constraints for the Internet of Things ». Thesis, Nantes, 2017. http://www.theses.fr/2017NANT4035/document.
Texte intégralNowadays, due to the rapid growth of Internet of Things (IoT) towards technologies, the protection of transmitted data becomes an important challenge. The devices of the IoT are very constrained resource in terms of computing capabilities, energy and memory capacities. Thus, the design of secure, efficient and lightweight crypto-systems becomes more and more crucial. In this thesis, we have studied the problem of chaos based data security under real-time and energy constraints. First, we have designed and implemented three pseudo-chaotic number generators (PCNGs). These PCNGs use a weak coupling matrix or a high diffusion binary coupling matrix between chaotic maps and a chaotic multiplexing technique. Then, we have realized three stream ciphers based on the proposed PCNGs. Security performance of the proposed stream ciphers were analysed and several cryptanalytic and statistical tests were applied. Experimental results highlight robustness as well as efficiency in terms of computation time. The performance obtained in computational complexity indicates their use in real-time applications. Then, we integrated these chaotic stream ciphers within the real-time operating system Xenomai. Finally, we have measured the energy and power consumption of the three proposed chaotic systems, and the average computing performance. The obtained results show that the proposed stream ciphers can be used in practical IoT applications
Laarouchi, Mohamed Emine. « A safety approach for CPS-IoT ». Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS010.
Texte intégralFor several years, we have been witnessing a convergence between cyber-physical systems (CPS) and the Internet of Things (IoT). CPS integrate embedded systems with their physical and human environment by ensuring communication between different sensors and actuators. The IoT targets the network and communication protocols between connected objects. This convergence offers prospects for various applications ranging from connected vehicles to smart grids and the factories of the future. The aim of this thesis is to ensure and guarantee the operational safety of CPS-IoT systems. For this, we have considered a specific case study throughout the thesis which is UAVs. Initially, we focused on the different methods of analysis of operational safety that already exist. These methods have proved their worth for the design and implementation of on-board systems. Throughout this process, we tried to answer the following question: are these existing methods adequate to perform the necessary safety analyses for CPS-IoT? It was concluded that new approaches to analyse the safety of operation of CPS-IoT systems are needed due to the significant complexity of these systems. As a second step, a methodology for predictive analysis of the resilience of CPS-IoTs was proposed. Resilience is defined as being the ability of a system to tolerate failures, to continue to provide the requested service while considering the various internal and external constraints of the system. Two different types of resilience have been differentiated: endogenous and exogenous resilience. Endogenous resilience is the inherent ability of the system to detect and deal with internal faults and malicious attacks. Exogenous resilience is the ongoing ability of the system to maintain safe operation in its surrounding environment. The last part of our work was to investigate the impact of artificial intelligence on the safe operation of CPS-IoTs. More specifically, we looked at how artificial intelligence could be used to enhance UAV safety in the path planning phase. The results obtained were compared with existing planning algorithms
Challal, Yacine. « Sécurité de l'Internet des Objets : vers une approche cognitive et systémique ». Habilitation à diriger des recherches, Université de Technologie de Compiègne, 2012. http://tel.archives-ouvertes.fr/tel-00866052.
Texte intégralPatrigeon, Guillaume. « Systèmes intégrés adaptatifs ultra basse consommation pour l’Internet des Objets ». Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS036.
Texte intégralThe Internet of Things is an infrastructure enabling advanced services by interconnecting things. Although the large variety of Internet of Things applications involve many kinds of technical solutions, many of those are based on a typical architecture that can be divided in three layers: the perception layer, the transport layer and the services layer. The dispositive that composed the perception layer, called “sensor nodes”, are subject of technical requirements: size, security, reliability, autonomous, and long lifetime. Sensor nodes’ energy efficiency is the most critical point where traditional technologies show their limitations. New strategies and solutions are proposed to overcome this technical challenge; however, how can those be evaluated, with which tools and at which level? How emerging technologies can be optimized and integrated inside microcontrollers for Internet of Things applications? Which are the new strategies for energy management to adopt with technologies such as 28 nm FD-SOI and non-volatiles memories? What are their limitations? Will they be sufficient?To evaluate the integration of emerging technologies inside low power microcontrollers, we propose a new methodology using an FPGA-based sensor node prototyping platform. Able to operate in already deployed wireless sensor networks, we use it to perform fast and precise evaluations, taking account of the application context. We studied and evaluated multiple memory architecture configurations based on STT magnetic memories as a replacement of traditional solutions, and showed that the non-volatile STT memory technology can improve a microcontroller’s energy efficiency for embedded applications
Patel, Pankesh. « Environnement de développement d'applications pour l'Internet des objets ». Phd thesis, Université Pierre et Marie Curie - Paris VI, 2013. http://tel.archives-ouvertes.fr/tel-00927150.
Texte intégralLivres sur le sujet "Internet des objets – Informatique"
Kathy, Walrath, dir. The Java tutorial : Object-oriented programming for the Internet. 2e éd. Reading, Mass : Addison-Wesley, 1998.
Trouver le texte intégralCampione, Mary. The Java tutorial : Object-oriented programming for the Internet. Reading, Mass : Addison Wesley, 1996.
Trouver le texte intégralKathy, Walrath, dir. The Java tutorial : Object-oriented programming for the Internet. Reading, Mass : Addison Wesley, 1996.
Trouver le texte intégral1965-, Noumeir Rita, dir. Programmation en Java, version 1.2 : Concepts et applications. Montréal : Chenelière/McGraw-Hill, 1998.
Trouver le texte intégralKathy, Walrath, et Huml Alison, dir. The Java tutorial : A short course on the basics. 3e éd. Boston : Addison-Wesley, 2001.
Trouver le texte intégralJava la synthèse : Des concepts objets aux architectures Web. 3e éd. Paris : Dunod, 2000.
Trouver le texte intégralPro Perl. Berkeley, CA : Apress, 2005.
Trouver le texte intégralClark, Richard. Formation à-- ASP.net. Les Ulis, France : Microsoft Press, 2001.
Trouver le texte intégralDugerdil, Philippe. Smalltalk-80 : Programmation par objets. Lausanne : Presses polytechniques et universitaires romandes, 1990.
Trouver le texte intégralFerber, Jacques. Conception et programmation par objets. 2e éd. Paris : Hermès, 1991.
Trouver le texte intégralChapitres de livres sur le sujet "Internet des objets – Informatique"
Joshi, Keyur, Angelina Aziz, Philip Dietrich et Markus König. « Efficient Data Curation Using Active Learning for a Video-Based Fire Detection ». Dans CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality, 616–24. Florence : Firenze University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0289-3.60.
Texte intégralJoshi, Keyur, Angelina Aziz, Philip Dietrich et Markus König. « Efficient Data Curation Using Active Learning for a Video-Based Fire Detection ». Dans CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality, 616–24. Florence : Firenze University Press, 2023. http://dx.doi.org/10.36253/10.36253/979-12-215-0289-3.60.
Texte intégralNovicky, Filip, Joshua Offergeld, Simon Janssen et Pablo Lanillos. « Robotic Active Tactile Sensing Inspired by Serotonergic Modulation Using Active Inference ». Dans Biomimetic and Biohybrid Systems, 33–55. Cham : Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38857-6_3.
Texte intégralBenghozi, Pierre-Jean, Sylvain Bureau et Françoise Massit-Folléa. « Defining the Internet of Things ». Dans L’Internet des objets, 91–99. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.97.
Texte intégralCarroué, Laurent. « Informatique, électronique, télécommunications, Internet, médias ». Dans Images économiques du monde 2019, 79–81. Armand Colin, 2018. http://dx.doi.org/10.3917/arco.bost.2018.01.0079.
Texte intégralCarroué, Laurent. « Informatique, électronique, télécommunications, Internet, médias ». Dans Images économiques du monde 2018, 103–5. Armand Colin, 2017. http://dx.doi.org/10.3917/arco.bost.2017.01.0103.
Texte intégralBenghozi, Pierre-Jean, Sylvain Bureau et Françoise Massit-Folléa. « Technical evolution of the Internet of Things ». Dans L’Internet des objets, 111–20. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.99.
Texte intégralBenghozi, Pierre-Jean, Sylvain Bureau et Françoise Massit-Folléa. « The prominence and challenges of the Internet of Things ». Dans L’Internet des objets, 101–10. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.98.
Texte intégralHONBA HONBA, Cédric. « Sémiotique et archive d’images ». Dans Corpus audiovisuels, 125–46. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.5705.
Texte intégralERTZ, Myriam, Shouheng SUN, Émilie BOILY, Gautier Georges Yao QUENUM, Kubiat PATRICK, Yassine LAGHRIB, Damien HALLEGATTE, Julien BOUSQUET et Imen LATROUS. « Les produits augmentés : la contribution de l’industrie 4.0 à la consommation durable ». Dans Le marketing au service du développement durable, 277–300. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9036.ch14.
Texte intégralActes de conférences sur le sujet "Internet des objets – Informatique"
Heiwy, Véronique. « Design guidelines for the internet of things ». Dans the 15th Ergo'IA "Ergonomie Et Informatique Avancé" Conference. New York, New York, USA : ACM Press, 2016. http://dx.doi.org/10.1145/3050385.3050392.
Texte intégralGarrett, Timothy, Saverio Debernardis, Rafael Radkowski, Carl K. Chang, Michele Fiorentino, Antonio E. Uva et James Oliver. « Rigid Object Tracking Algorithms for Low-Cost AR Devices ». Dans ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-35304.
Texte intégralHaboyan, Razmik. « La Grande Réinitialisation : projet, symptôme ou promesse ? La transition comme une arme de guérilla sémiotique ». Dans Actes du congrès de l’Association Française de Sémiotique. Limoges : Université de Limoges, 2024. http://dx.doi.org/10.25965/as.8487.
Texte intégralBouraoui, Zied, et Steven Schockaert. « Learning Conceptual Space Representations of Interrelated Concepts ». Dans Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California : International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/243.
Texte intégralSorbo, Emanuela, et Gianluca Spironelli. « INFORMATIVE MODELS OF CULTURAL HERITAGE. THE “UNFINISHED” CHURCH OF BRENDOLA. » Dans ARQUEOLÓGICA 2.0 - 9th International Congress & 3rd GEORES - GEOmatics and pREServation. Editorial Universitat Politécnica de Valéncia : Editorial Universitat Politécnica de Valéncia, 2021. http://dx.doi.org/10.4995/arqueologica9.2021.12097.
Texte intégralRastogi, Pramod K. « State of the Art in Optical Stress Analysis ». Dans The European Conference on Lasers and Electro-Optics. Washington, D.C. : Optica Publishing Group, 1996. http://dx.doi.org/10.1364/cleo_europe.1996.cwb1.
Texte intégralCmeciu, Doina, et Camelia Cmeciu. « VIRTUAL MUSEUMS - NON-FORMAL MEANS OF TEACHING E-CIVILIZATION/CULTURE ». Dans eLSE 2013. Carol I National Defence University Publishing House, 2013. http://dx.doi.org/10.12753/2066-026x-13-108.
Texte intégralKatkeviča, Santa, et Aina Strode. « Projection Mapping Method in Advertising Design ». Dans 80th International Scientific Conference of the University of Latvia. University of Latvia Press, 2022. http://dx.doi.org/10.22364/htqe.2022.71.
Texte intégralORLIANGES, Jean-Christophe, Younes El Moustakime, Aurelian Crunteanu STANESCU, Ricardo Carrizales Juarez et Oihan Allegret. « Retour vers le perceptron - fabrication d’un neurone synthétique à base de composants électroniques analogiques simples ». Dans Les journées de l'interdisciplinarité 2023. Limoges : Université de Limoges, 2024. http://dx.doi.org/10.25965/lji.761.
Texte intégralRapports d'organisations sur le sujet "Internet des objets – Informatique"
Aubry, Philippe, Nicolas Boileau, Marie Briandy, Marie-Christine Chauvat, Sandrine Conin et Éric Min-Tung. Rapport sur le chantier IdRef en Normandie. Normandie Université, décembre 2023. http://dx.doi.org/10.51203/rapport.nu.000003.
Texte intégral