Tesi sul tema "Mesures de réseau"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Mesures de réseau".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Tabue, Alain. "Modèles de comportement dynamique des charges dans un réseau électrique". Paris 9, 1989. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1989PA090040.
Testo completoDurand, Suzanne. "Mesures d'efficience d'un réseau intégré de services pour les personnes âgées". Thèse, Université de Sherbrooke, 2010. http://savoirs.usherbrooke.ca/handle/11143/368.
Testo completoKhiat, Nassima. "Détection et mitigation de vers dans le coeur de réseau : application aux réseaux Pair-à-Pair". Thesis, Evry-Val d'Essonne, 2010. http://www.theses.fr/2009EVRY0033.
Testo completoThe Internet and its users are daily the object of attacks of malware. Among them, we can find the worms, which distinguish themselves from the other attacks by their automatic way of propagation. This makes them potentially very dangerous. To make their propagation easier and faster, the worms can attack popular applications. The generalization of the use of Peer-to-Peer networks makes them a perfect target of worms called "Peer-to-Peer worms". These worms, and in particular the passive ones, are characterized by their stealthy. Indeed, they generate no suspect traffic, and are so difficult to detect in the network. The purpose of this thesis is to propose an effective solution against the passive Peer-to-Peer worms, to make Peer-to-Peer networks, which begin to be used to distribute some legal contents such as the VoD (Video on Demand) ones, more secure. We propose several algorithms and an architecture to detect the passive Peer-to-Peer worms in the network. We evaluate our algorithms in a simulator which we have developed, as well as with an analytical study. We then study the mitigation issue of the detected worms
Larocque, Jean-René. "Application de l'algorithme ISAR-GMSA à une antenne-réseau linéaire, simulations et mesures". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq25643.pdf.
Testo completoSid, Mohamed Amine. "Co-conception diagnostic et ordonnancement des mesures dans un système contrôlé en réseau". Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0003/document.
Testo completoThe works developed in this thesis deal with 'fault diagnosis and sensor scheduling co-design' in networked control system. This multidisciplinary subject requires theoretical knowledge in both fault diagnosis and communication networks. Our contribution consists in developing a co-design approach that integrates in the same framework the characteristics of fault diagnosis performance and real time sensor scheduling. The main benefit of this approach is minimizing the required network resources for attending acceptable fault diagnosis performances. We are interested in the development of more efficient and more adapted for real time implementation fault diagnosis algorithms while taking into account different types of communication constraints. In conjunction with these algorithms, two sets of sensor scheduling techniques are used : - Off-line scheduling - On-line scheduling (event triggered sampling) For off-line scheduling, the communication sequences are designed before the implementation of the diagnostic algorithm. In this context, we proposed several techniques for scheduling with different spatial and temporal complexity and adapted to different operating condition for the detection and the isolation of faults based on the information provided by the selected communication sequences. Moreover, we deal also with on-line scheduling techniques based on the event triggered sampling developed during the last decade. In This approach measurement packets are transmitted if and only if the transmission condition (event) is verified. This saves resources provided by the network while maintaining acceptable performance of fault diagnosis. The objective of these algorithms is to minimize the number of transmitted information which means less energy consumption and has a major importance in wireless networked control systems
Sid, Mohamed Amine. "Co-conception diagnostic et ordonnancement des mesures dans un système contrôlé en réseau". Electronic Thesis or Diss., Université de Lorraine, 2014. http://www.theses.fr/2014LORR0003.
Testo completoThe works developed in this thesis deal with 'fault diagnosis and sensor scheduling co-design' in networked control system. This multidisciplinary subject requires theoretical knowledge in both fault diagnosis and communication networks. Our contribution consists in developing a co-design approach that integrates in the same framework the characteristics of fault diagnosis performance and real time sensor scheduling. The main benefit of this approach is minimizing the required network resources for attending acceptable fault diagnosis performances. We are interested in the development of more efficient and more adapted for real time implementation fault diagnosis algorithms while taking into account different types of communication constraints. In conjunction with these algorithms, two sets of sensor scheduling techniques are used : - Off-line scheduling - On-line scheduling (event triggered sampling) For off-line scheduling, the communication sequences are designed before the implementation of the diagnostic algorithm. In this context, we proposed several techniques for scheduling with different spatial and temporal complexity and adapted to different operating condition for the detection and the isolation of faults based on the information provided by the selected communication sequences. Moreover, we deal also with on-line scheduling techniques based on the event triggered sampling developed during the last decade. In This approach measurement packets are transmitted if and only if the transmission condition (event) is verified. This saves resources provided by the network while maintaining acceptable performance of fault diagnosis. The objective of these algorithms is to minimize the number of transmitted information which means less energy consumption and has a major importance in wireless networked control systems
Zamuner, Martina. "Nanosystèmes pour des mesures électroanalytiques avancées". Thesis, Bordeaux 1, 2008. http://www.theses.fr/2008BOR13713/document.
Testo completoIn this thesis, arrays of nano- and microelectrodes are developed to obtain electrochemical and optoelectrochemical sensors, by using the template synthesis as a microfabrication technique. In the first part, ensembles of nanoelectrodes (NEEs), obtained using a track-etched polycarbonate membrane as template, are functionalised in order to obtain electrochemical immunosensors. A biorecognition chain, antigen-antibody, is immobilized on the wide polycarbonate membrane letting uncovered the gold nanodisk electrodes. A label redox enzyme, linked to the biorecognition chain, is recognized and quantified electrochemically. Two different detection schemes are developed and low protein detection limits are achieved. In the second part, a macroporous micrometer sized opto-electrochemical sensor is developed on the distal face of an imaging fiber (coherent optical fiber bundle). A microwell array is obtained by controlled chemical etching, by exploiting the different chemical composition between cores and clads. Colloidal templates are created inside the microcavities, using polystirene beads of 280 nm. Gold is deposited inside the cavities, filling the void in the colloidal template, exploiting electroless and electrochemical deposition techniques. The gold macroporous structure inside the wells is successfully tested as SERS substrate
Scola, Joseph. "Etude de la dynamique d'un réseau de vortex dans un supraconducteur par mesures de bruit". Phd thesis, Université de Caen, 2005. http://tel.archives-ouvertes.fr/tel-00011633.
Testo completoEn premier lieu, le bruit du système est observé dans des lames de Niobium dans différentes conditions : différentes tailles d'échantillon ont été ajustées de manière contrôlée, et des défauts de surface ont été introduits par irradiation ionique basse énergie, puis caractérisés par imagerie à force atomique. Il apparaît que le bruit basse fréquence, de même que le courant critique sont principalement dus à l'ancrage de surface. De plus, la portée des fluctuations se trouve être corrélée à la distribution spatiale de la rugosité.
Le régime bruyant en supraconductivité de surface, sans vortex dans le volume, montre clairement que de pures fluctuations de courant de surface conduisent au même bruit qu'en présence de vortex dans le volume. Ce résultat est confirmé par des mesures complémentaires de fluctuations de tension dans plusieurs directions, réalisée dans des échantillons massifs d'un alliage Pb-In.
La statistique du processus bruyant a été étudiée dans des micro-ponts sur couche mince de Niobium: les résultats indiquent que l'état de la surface, ainsi que celui des bords du système influent sur le régime bruyant du dépiégeage, au cours duquel des effets non-gaussiens et non-stationnaires, typiques d'un vol de Lévy, apparaissent.
Ramos, milis Guilherme. "Apport des mesures des compteurs Linky pour la connaissance des charges du réseau de distribution". Electronic Thesis or Diss., Université Grenoble Alpes, 2024. http://www.theses.fr/2024GRALT021.
Testo completoThe distribution grid occupies a central position in the energy transition. This results in two key changes for the network: an (r)evolution of uses and a digital (r)evolution. In this context, this thesis begins by creating a new mapping of the uses of data from smart meters. Building upon this mapping, the thesis will delve into two central themes of great importance in the context of energy transition. The first is an analysis of the Diversity Factor of Low Voltage (LV) charges and its estimation. The second involves estimating the load curves of customers on the LV grid using an innovative method
Wang, Xiaomin. "Décider du type de distribution de degré d'un graphe (réseau) à partir des mesures traceroute-like". Paris 6, 2011. http://www.theses.fr/2011PA066608.
Testo completoBulusu, Sravani Teja. "Méthodologie d'ingénierie des exigences de sécurité réseau". Thesis, Toulouse 3, 2019. http://www.theses.fr/2019TOU30084.
Testo completoBuilding secure networks is crucial as well as challenging for any organization. Network security majorly concerns the security architectural needs that describe network segmentation (i.e., security zoning); security of network devices connecting the communicating end user systems; and security of the information being transferred across the communication links. Most often, a late consideration of security aspects (i.e., post-deployment of network design) inevitably results in an increase in costs as well as in the complexity to take into account the necessary changes that have be made to the existing infrastructures. In this regard, network security requirements hold a paramount importance since they drive the decisions related to the implementation of security controls about business needs. Indeed, bad network security requirements can lead to ineffective and costly security or worth security holes in the network security design. Nevertheless, current security requirement engineering methodologies render no support to derive network security requirements. This thesis work is a part of the research project DGA IREHDO2 (Intégration REseau Haut Débit embarqué Optique 2ème phase) that concerns aircrafts future generation networks. Our work is done mainly in collaboration with AIRBUS and is related to the security requirements engineering process for aircraft networks. Our objective in this project is to propose an SRE methodology for capturing and analysing network security requirements, and that facilitates the refinement into network security and monitoring configurations (TOP/DOWN approach). The complexity addressed comes at a time from the differences in point of view: i) with regard to the understanding of the issue of security by different stakeholders, ii) the nature of the systems impacted and the variability of the levels of abstraction in the network development cycle. In this work, we defined SRE methodology based on the abstraction levels proposed by SABSA (Sherwood Applied Business Security Architecture) method in order to structure the refinement activity of business needs into network security requirements. Indeed, SABSA recommends the expression of the needs considering the Business view (decision makers), Architect's view (objectives, risks, processes, applications and interactions), Designer's view (security services), Builder's view (security mechanisms) and Tradesman's view (products, tools, technologies). We considered the first three views. We express the business and architect's views using STS (Social-Technical Systems) formalism. We also propose to represent attacks as multi-agent systems to facilitate the analysis of security risks at these first two views. For expressing the network security requirements captured at Designer's view, we propose a methodology that automates parts of the process of security zoning and network security requirements elicitation using a definite set of formalized rules derived from security design principles and formal integrity models. We developed a tool that implements these rules in ASP (Answer set programming), which facilitates calculating cost-optimal security zone models. In the end, to ensure traceability between the three views, we defined a new modelling notation based on the concepts proposed in KAOS (Keep All Objectives Satisfied) and STS. We illustrate our methodology using a scenario specific to the IRHEDO2 project. Finally, we evaluate our methodology using: 1) an e-commerce enterprise case study; 2) a new scenario specific to the IRHEDO2 project
Paradinas, Pierre. "La Biocarte : intégration d'une carte à microprocesseur dans un réseau professionnel santé". Lille 1, 1988. http://www.theses.fr/1988LIL10100.
Testo completoGiuliani, Stéphane. "Détection et localisation de défaillances de capteurs dans un réseau de mesures pluviométriques : cas de l'agglomération nancéienne". Vandoeuvre-les-Nancy, INPL, 1998. http://www.theses.fr/1998INPL054N.
Testo completoIn the field of urban sewer network management, rainfall data is intensively used for on-line rainfall monitoring and for off-line study and design of network hydraulic equipment and management strategies. Sensor data validation is thus an issue of great importance. This thesis investigates the off-line failure diagnosis applied to the rain gauge network of the urban area of Nancy. The objective is to provide indicators on the gauge operation to operators from data collected and processed at a 5-min time rate. Analysis of historical data series reveals a significant failure rate and the possibility of multiple failures. The failures mainly encountered concern the clogging of gauges. From a diagnosis point fo view, the general approach tackled relies on the consistency between observations and an analytical model which represents the normal behaviour of the system. This yields the generation of so-called residuals used as ffailure indicators. The required redundancy relations between rain gauges are expressed in the form of multiple variables regression models between each gauge and a group of surrounding sensors. Several failure detection and isolation methods are then evaluated using raw data including failure cases. Different consistency tests between measurements and model equations with respect to adaptive tolerances are studied. For isolation purposes, attention is particularly focused on the formulation of the formulation of the signatures of the failures into the residuals and different inference techniques are evaluated. An architecture dedicated to the detection and isolation of gauge clogging is finally proposed
Gravel, Marie. "Structure et performance du réseau des sociétés de capital de risque canadiennes, américaines et européennes". Mémoire, Université de Sherbrooke, 2015. http://hdl.handle.net/11143/6692.
Testo completoLongevialle, Christophe. "Contribution à la sécurisation d'un réseau d'information élaborée, par cryptographie et "pare-feu" informatique : application à une base de gestion de rssources humaines". Marne-la-Vallée, 2004. http://www.theses.fr/2004MARN0187.
Testo completoAron, Christophe. "Étude des propiétés magnétiques de multicouches métalliques par spectroscopie Mössbauer et mesures d'aimantation". Grenoble INPG, 1991. http://www.theses.fr/1991INPG0108.
Testo completoAndriahantenaina, Adrijean. "Implémentation matérielle d' un micro-réseau SPIN à 32 ports". Paris 6, 2006. http://www.theses.fr/2006PA066003.
Testo completoLlorens, Cédric. "Mesure de la sécurité "logique" d'un réseau d'un opérateur de télécommunications". Phd thesis, Télécom ParisTech, 2005. http://pastel.archives-ouvertes.fr/pastel-00001492.
Testo completoSouag, Nadia. "Caractérisation par des mesures magnétiques de l'oxyde de zinc entrant dans la composition des varistances". Toulouse 3, 1987. http://www.theses.fr/1987TOU30310.
Testo completoXydas, Ioannis. "Aide à la surveillance de l’application d’une politique de sécurité dans un réseau par prise de connaissance d’un graphe de fonctionnement du réseau". Limoges, 2007. https://aurore.unilim.fr/theses/nxfile/default/ba3a6a50-5708-4f1a-9d00-dca7fa1469cd/blobholder:0/2007LIMO4006.pdf.
Testo completoIn this thesis we study the possibility of applying visualization and visual analytics in the context of data analysis for network security. In particular, we studied Internet web security and by using an “intelligent” visual representation of web attacks we extracted knowledge from a network operation graph. To achieve this goal we designed and developed an intelligent prototype system. This system is a surveillance aid for the security and web analyst, offering him/her a user friendly visual tool to detect anomalies in web requests by monitoring and exploring 3D graphs, to understand quickly the kind of undergoing attack by means of colours and the ability to navigate into the web request payload, of either normal or malicious traffic, for further analysis and appropriate response. The fundamental parts of such a system are Artificial Intelligence and Visualization. A hybrid expert system such as an Evolutionary Artificial Neural Network proved to be ideal for the classification of the web attacks
Lericolais, Marine. "Terrorisme international et mesures de sûreté : analyse économique du comportement du voyageur sur le réseau de transport aérien mondial". Phd thesis, Université Lumière - Lyon II, 2011. http://tel.archives-ouvertes.fr/tel-00816114.
Testo completoNguyen, Duc Huy. "Amélioration de l’amortissement des oscillations de puissance du réseau électrique avec les dispositifs FACTS et les mesures à distance". Mémoire, École de technologie supérieure, 2011. http://espace.etsmtl.ca/1135/1/NGUYEN_DUC_Huy.pdf.
Testo completoDepigny, Marine. "Terrorisme international et mesures de sûreté : analyse économique du comportement du voyageur sur le réseau de transport aérien mondial". Thesis, Lyon 2, 2011. http://www.theses.fr/2011LYO22020/document.
Testo completoIn our dissertation, we question the impact of both international terrorism and security measures on the behavior of the users of the global air transportation network. Using an econometric model, we analyze a new database, AirNetTerror, which contains data on all international passenger flows toward the U.S. from 1990 to 2006 as well as the events of international terrorism by country for the same period. The relevance of our research is twofold. On the one hand, our investigation regarding air travelers’ behavior and their possibilities of modifying their itinerary in light of international terrorism has – so far as we know – never been studied. On the other hand, as we analyze passenger flows from the perspective of the network, we propose a dynamic representation of the impact of travelers’ behavior changes related to terrorist threats and security measures. In particular, taking into account the interdependent security that rules the global air transport network, allows us to question the existence of failures in security measures. Our results underline a significant impact of both international terrorist events and security measures. Furthermore, we locally observe itinerary modifications of travelers that are linked to the previous phenomena. Thus, the combined effect of terrorist threats and security measures seems to lead to equilibrium breaks – that are limited but real – in passenger flows of the global air network. Our thesis offers a different representation of the impact of international terrorism on air transport by placing the traveler’s behavior at the center of the strategic interactions between security actors and terrorists
Plaisance, Hervé. "Étude de la composition chimique des précipitations en France à partir du réseau de MEsures des Retombées Atmosphériques MERA". Compiègne, 1996. http://www.theses.fr/1996COMPD939.
Testo completoComets, Francis. "A propos des systèmes de particules en interaction sur un réseau". Paris 11, 1987. http://www.theses.fr/1987PA112312.
Testo completoWe are interested in particles systems located on a lattice, with different type of interaction For short range interaction on zd, we study the large deviation properties for the empirical field of a Gibbs measure we also cover the case of random interaction and derive some applications Next we study Glauber dynamics of a local mean field model on the torus in the asymptotics of a large number of particles The fluctuation process has to be rescaled in space and time at the critical temperature We analyse the dynamics of a change of attractor using large deviations techniques at low temperature we recover a description for nucleation We then need to study the stationary points in such a local mean field model this is tackled in the frame of bifurcation theory
Taurand, Geneviève. "Mesures de réflectométrie prises avec un interféromètre à peignes de fréquence". Thesis, Université Laval, 2010. http://www.theses.ulaval.ca/2010/27255/27255.pdf.
Testo completoMorvan, Pierre-Antoine. "Mesures de déformations par capteurs à fibres optiques au cœur de matériaux composites". Nantes, 2013. http://archive.bu.univ-nantes.fr/pollux/show.action?id=ad04d174-7b51-4ba6-ac5d-495f007179ba.
Testo completoThe use of optical fibers for strain measurements tends to generalize because of its numerous advantages over other sensor technologies. Today strain gauges based on the use of optical fiber are easy and commercially available. However, this can become complex when the fiber is embedded into a material displaying very different mechanical properties from the properties of the silica. The main purpose of this work is to further question the use of fiber optic strain sensors to obtain quantifiable and/or relevant measures inside composite materials. Firstly we present a state of the art of different types of fiber optic sensors by focusing our attention on their use in composite materials. The second part of this work is devoted to optical fibers included in different homogeneous materials. Analytical and numerical models are compared to experimental studies in order to quantify measurement errors eventually made when the sensor is embedded into a material. Then a method is proposed in order to obtain both the longitudinal and the radial strain with only one optical fiber sensor. Finally, the concepts presented in the second part are validated through the study of a specimen made of two materials crossing the sensor’s location. Furthermore we evaluate the use of this sensor in a laminated composite structure under a different configuration than that proposed in the literature : the sensor is inserted across the thickness of the laminate
Riquet, Damien. "DISCUS : une architecture de détection d'intrusions réseau distribuée basée sur un langage dédié". Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10207/document.
Testo completoNowadays, information systems are everywhere and their interconnexion is almost complete. The rise of complex and large computing infrastructures has brought a need for increased security. We need to follow a sound methodology so that one can understand an exploit develop a counter-measure and deploy it as soon as possible. To tackle those issues, we propose DISCUS, a new distributed architecture that takes advantage of existing solutions as well as distributed probes. This approach leads to finer, collaborative analysis where each probe enrich the global knowledge of the architecture as a whole. Our solution introduces two main issues : determine efficient distribution mechanism to implement collaboration and facilitate the developpement of the software that will run on highly heterogeneous hardware. This thesis mainly focuses on the later. The actual development of the software that will run on the probes can not be made by a security special or a system administrator because of the diversity of the probes (in term of memory, computing power, network location…). This would imply that the developer has strong knowledge on security, networking, kernel development, embeded systems, hardware development. Such a developer is hard to find. To overcome this problem, we propose DISCUS, a domain specific language. With this langage, one can implement security rules without the need to take implementation details into account. Our compiler chain takes the rules and is able to build software, or hardware, image specific for each probes of the network. This thesis presents this language, some case studies and its evaluation in term of expressivity, robustness and performances
Bahouche, Mebrouk. "Etude et Traçabilité du calibrage " Line - Attenuator - Reflect", pour les mesures sous pointes à l'aide d'un analyseur de réseau vectoriel". Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00567066.
Testo completoBahouche, Mebrouk. "Etude et traçabilité du calibrage "Line-Attenuator Reflect" pour des mesures sous pointes à l'aide de l'analyseur de réseau vectoriel". Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00567066.
Testo completoThe LAR (Line-Attenuator-Reflect) calibration procedure is particularly attractive because it is already integrated into modern VNAs and it enables broadband measurements with a limited number of standards. On the other hand, only a few studies concern the traceability assessment of this method. That is the reason why the LNE (Laboratoire National de Métrologie) decided to estimate the traceability and accuracy of S parameters measurement when the LAR calibration method is used. In this context, the thesis can be summarized as follows: 1) Realization of a on wafer calibration kit allowing to execute both the LAR calibration and the Multiline TRL calibration which is considered as the reference calibration for on wafer measurements. 2) Development of a new method in order to estimate the errors due to the fact that the input and output impedances of the standard attenuator is different from 50 Ω. This solution is very efficient and it does not require an accurate determination of the reference impedance of the LAR calibration technique. 3) Development of an original method for determining the input and output impedances of the LAR calibration procedure leading to a precise measurement of the reference impedance. 4) Realization of a calibration kit for users, with three different methods to determine the reference impedance. ● Electrical model of the standard attenuator. ● Polynomial interpolation of the reference impedance measurement. ● Development of a new simplified and low cost technique named the LAR-L procedure. 5) Analysis of errors when the substrate of the calibration kit is different from the substrate of the device under test
Goral, Benoit. "Technique et Méthodologie de Conception du Réseau de Distribution d'Alimentation d'une Carte Electronique Rapide à Haute Densité d'Interconnexion". Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLN037/document.
Testo completoToday's economical context leads electronics and high-tech corporations not only to innovate with a sustained rhythm but also to reduce the design cycle of new products. In order to remain competitive, these corporations must release regularly new products with new functionalities or enhancing performances of the last generation of this product. The enhancement from one generation of the product to the other can be quantified by the speed of execution of a task, the package size or form factor, the battery life and power consumption.The design methodology following these constraints is thus very tough. Indeed, integration of new functionalities as miniaturization of products imply a densification of the printed circuit board. The number of layer in the stack up is increased, isolation between nets is reduced, the use of integrated circuits embedding different functions as SOC or SIP implies a multiplication of the number of voltages. Moreover the increase of circuit performances implies a increasing data rate exchanged between component of the same printed circuit board and occasioning a widening of the reference clock and signal frequency spectrum. These design constraints are the root cause of the apparition of electromagnetic compatibility, signal integrity and power integrity issues. Failure risks must then be limited by fully understanding phenomenon occurring on the board by, on one side, realizing a precise dimensioning pre layout analysis aiming the elimination or reduction of the issues at the beginning of the design cycle, and on the other side, validating the layout by post layout simulation once the printed circuit board routed.This study proposed by Thales Communication and Security in collaboration with public research laboratory SATIE (System and Application of Energy and Information Technologies) of Ecole Normale Supérieure de Cachan within a industrial convention for development through research aims to develop a design methodology for power delivery network of digital printed circuit board with the goal of ensuring good behavior without or by reducing the number of prototypes.The first chapter of this manuscript include an introduction to the context of the study, a precise description of the studied system and the physical phenomenon ruling its behavior, and finally a state of the art of the power integrity technique analysis. A presentation of the test vehicle, designed during the work and support of all measurement results will constitute the focus of second chapter. This chapter presents and describes all the scenarios and implementations created for the observation and measurement of Power Integrity phenomenon and realise measurement-simulation results correlation. In a third part, modeling techniques of each element of the Power Delivery Network are described. The validity of the models is proven by correlating simulation results of each element with measurement results. The fourth chapter presents the analysis and design methodology developed from the results of the different modeling techniques presented in the previous chapter. Simulation tools and their configuration are precisely described and simulation results are compared with measurement results obtained on the test vehicle for the whole system. In the fifth chapter, the interest of power delivery network model will be extended to signal integrity analysis demonstrating how including this model allows to obtain simulation results closer from measurement results by running Signal Integrity Power aware simulation. Finally, the last part of this document synthetizes the work realized and presented in this document, takes a critical look on it and proposes future works and orientations to extend knowledges and understanding of Power Integrity Phenomenon
Ahmad, Ahmad. "Sécurité orientée utilisateur pour les réseaux personnels sans fil". Thesis, Evry, Institut national des télécommunications, 2010. http://www.theses.fr/2010TELE0009.
Testo completoWireless Personal Area Network (WPAN) communications concept is generally restricted to couples of devices (a phone, a headset, a camera) and strongly related to a user and communicating very periodically (exchanges of differentBtypes). Nonetheless, we believe that the concept will evolve in the near future to create a distributed communication network all around users with more devices. Such a distributed network is called a Personal Network (PN). The next step after the distributed network creation is to interconnect them with certain restrictions. Since the WPAN is generally a private area, we do not like to expose all the resources to external users but still we would like to let them have restricted access to certain facilities. Similarly, we would like to peer friends to let us use their own resources with equivalent conditions. As devices involved in the Personal Networks, in some cases, have a LowData Rate nature, implementing legacy security protocols seems to be inefficient.In fact, such devices require a minimal implementation of security solutions withlow cost which can not be provided by known protocols. Moreover, a verticaloverview of the communication stack gives insight on the difficulties of applyingthese protocols. We propose an efficient physical layer encryption to be implementedafter the error coding process. The proposed architecture relies on the use of the well proven secure Output Feedback Mode OFB using AES algorithm as a Cipher. The next contribution is targeting the development of a hierarchical key agreement between multi-parties to secure communication between many clusters related to only one owner. One step after securing the Intra-Personal Network is to secure resource sharing between many PNs. Resources are not necessarily in the same authentication domain and the group that uses them is called a federation. Our contribution is based on two components: A signaling protocol and a group key management system. We close our work by providing a security solution that targets the integration of the PN within the future internet, more precisely, the network of information. In the future internet, everything is mobile and virtually connected to everything where the object takes the cornerstone. In the other hand, Personal net works are evolving to create Smart personal networks around the user. In the object-centric and user-centric concepts, information access becomes easier but establishing good security becomes harder. The difficulty is not finding new secure algorithms but rather that of adapting and enhancing existing solutions to meet the security requirements desirable for the interaction between these networks. In this contribution, we propose a new solution that merges Identity-Based cryptography and the Certificateless Cryptography cryptographic systems into only one in order to keep their advantages and to resolve their problems
Grandemange, Quentin. "Contribution à la modélisation et à la détection d'anomalies du traffic Internet à partir de mesures d'un coeur de réseau opérateur". Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0061/document.
Testo completoInter-domain routing statistics are not usually publicly available but with the partnership with Post Luxembourg, we deployed a network wide measurements of Internet traffic. Those statistics show clear daily and weekly pattern and several points of interest. From all the information gathered, two modelling approach were chosen: the first one from the time series domain and the second one from the machine learning approach. Both were tested on several dataset of autonomous systems and the second one, Gaussian Process, was kept for the next steps. The proposal of this study is the development of a software solution called ANODE, which is used at Post Luxembourg, allowing the analysis of backbone traffic: measurments, modelling, forecasting and anomaly detection
Grandemange, Quentin. "Contribution à la modélisation et à la détection d'anomalies du traffic Internet à partir de mesures d'un coeur de réseau opérateur". Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0061.
Testo completoInter-domain routing statistics are not usually publicly available but with the partnership with Post Luxembourg, we deployed a network wide measurements of Internet traffic. Those statistics show clear daily and weekly pattern and several points of interest. From all the information gathered, two modelling approach were chosen: the first one from the time series domain and the second one from the machine learning approach. Both were tested on several dataset of autonomous systems and the second one, Gaussian Process, was kept for the next steps. The proposal of this study is the development of a software solution called ANODE, which is used at Post Luxembourg, allowing the analysis of backbone traffic: measurments, modelling, forecasting and anomaly detection
Pautrat, Alain. "ancrage et dynamique d'un réseau de vortex dans le cadre d'un ancrage de surface". Phd thesis, Université de Caen, 2000. http://tel.archives-ouvertes.fr/tel-00010046.
Testo completoToublanc, Thomas. "Sécurisation de capteurs/actionneurs sur réseau industriel". Thesis, Lorient, 2018. http://www.theses.fr/2018LORIS512/document.
Testo completoToday, production systems are facing their 4th revolution. This revolution is digital with increasingly dense and complex networks opening on the outside. This openness makes these systems more vulnerable. The threats on these Cyber-Physical Production Systems (CPPS) are no longer just theoretical. The attacks on the German steel mill or the Wannacry crypto virus are perfect examples. This work proposes a tool contributing to the security of the SCPP. Our contributions are threefold: The design of an Anomaly Detection and Response System (ADRS) placed on the field network. It integrates behavioral and informational detection methods. It also includes passive response capabilities, implementing feedback to the human or to higher level systems, and active integrating order filtering or fallback. The application of the proposed methods naturally entails an additional design effort which must be reduced. We have therefore developed an approach to assist designers in the configuration of our ADRS. It is based on a hybrid approach (component / operation) and extends an existing design flow. Several transformations refine monitoring / supervision views of the components while others generate the configuration of the ADRS. A third contribution proposes a realistic demonstrator based on a virtual test environment. It integrates the joint simulation of the operative part and the control part and makes it possible to show the functional qualities of the solutions in the face of attack or failure scenarios
Daffé, Khadim. "Caractérisation hyperfréquence sous pointes de nano-dispositifs : métrologie et instrumentation". Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1I080/document.
Testo completoIn the frame of the spectacular development of nano-objects, innovative on-wafer electrical measurement methods must be addressed at the nanoscale. In particular, two main issues have been identified. On one hand, nano-devices exhibit very high dynamic impedance in contrast with conventional measuring microwave instruments. On the other hand, there is an inherent size discontinuity between nano-objects and conventional measurement systems. Given the scientific challenge and a relatively limited state of the art, several avenues of investigation have been explored. First, as part of a European project bringing together metrology laboratories, and the joint laboratory IEMN-STMicroelectronics®, the traceability of nano-devices high impedance measurements is established. In a second step, the development of an electrical on-wafer measuring platform for nano-devices is described. This includes the development of new generations of GSG (Ground-Signal-Ground) miniaturized probes in MEMS (Microelectromechanical systems) technology with reduced access pads. The probes are mounted on a robotic nano-positioning platform integrated in a scanning electron microscope
Ahmad, Ahmad. "Sécurité orientée utilisateur pour les réseaux personnels sans fil". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2010. http://www.theses.fr/2010TELE0009.
Testo completoWireless Personal Area Network (WPAN) communications concept is generally restricted to couples of devices (a phone, a headset, a camera) and strongly related to a user and communicating very periodically (exchanges of differentBtypes). Nonetheless, we believe that the concept will evolve in the near future to create a distributed communication network all around users with more devices. Such a distributed network is called a Personal Network (PN). The next step after the distributed network creation is to interconnect them with certain restrictions. Since the WPAN is generally a private area, we do not like to expose all the resources to external users but still we would like to let them have restricted access to certain facilities. Similarly, we would like to peer friends to let us use their own resources with equivalent conditions. As devices involved in the Personal Networks, in some cases, have a LowData Rate nature, implementing legacy security protocols seems to be inefficient.In fact, such devices require a minimal implementation of security solutions withlow cost which can not be provided by known protocols. Moreover, a verticaloverview of the communication stack gives insight on the difficulties of applyingthese protocols. We propose an efficient physical layer encryption to be implementedafter the error coding process. The proposed architecture relies on the use of the well proven secure Output Feedback Mode OFB using AES algorithm as a Cipher. The next contribution is targeting the development of a hierarchical key agreement between multi-parties to secure communication between many clusters related to only one owner. One step after securing the Intra-Personal Network is to secure resource sharing between many PNs. Resources are not necessarily in the same authentication domain and the group that uses them is called a federation. Our contribution is based on two components: A signaling protocol and a group key management system. We close our work by providing a security solution that targets the integration of the PN within the future internet, more precisely, the network of information. In the future internet, everything is mobile and virtually connected to everything where the object takes the cornerstone. In the other hand, Personal net works are evolving to create Smart personal networks around the user. In the object-centric and user-centric concepts, information access becomes easier but establishing good security becomes harder. The difficulty is not finding new secure algorithms but rather that of adapting and enhancing existing solutions to meet the security requirements desirable for the interaction between these networks. In this contribution, we propose a new solution that merges Identity-Based cryptography and the Certificateless Cryptography cryptographic systems into only one in order to keep their advantages and to resolve their problems
El, Khoury Hicham. "Une modélisation formelle orientée flux de données pour l'analyse de configuration de sécurité réseau". Toulouse 3, 2014. http://thesesups.ups-tlse.fr/2499/.
Testo completoThe implementation of network security policy requires the configuration of heterogeneous and complex security mechanisms in a given network environment (IPsec gateways, ACLs on routers, stateful firewalls, proxies, etc. ). The complexity of this task resides in the number, the nature, and the interdependence of these mechanisms. Although several researchers have proposed different analysis tools, achieving this task still requires experienced and proficient security administrators who can handle all these parameters. In this thesis, we propose a solution to facilitate the work of network administrators. Indeed, many inconsistencies come from the incompatibility of policy rules and/or incompatible mechanisms implemented in devices through which packets travel. A generic formal theory that allows reasoning about network data flows and security mechanisms is missing. With this end in mind, we develop in this thesis three results: •A formal data-flow oriented model to analyze and detect network security conflicts between different mechanisms playing a role at various ISO levels. We modeled a flow of information by a triplet containing the list of communication protocols (i. E. , encapsulation), the list of authenticated attributes and the list of encrypted attributes, •A generic attribute-based model for network security mechanisms representation and configuration. We have formally specified the capacity and configuration of security mechanisms by constructing an abstraction of physical flows of data blocks. We have proposed a solution that can satisfy security requirements and can help conflicts analysis in the deployment of technologies installed on different devices, •To evaluate both the ability of expression and analysis power of the modeling language. We have used CPN Tools [Jensen et Kristensen 2009] and [CPN tools] to formally specify our language. The goal of our research is to propose a modeling language for describing and validating architectural solutions that meet network security requirements. Simulations are applied to specific scenarios, such as the IPsec, NA(P)T and Netfilter/iptables protocols, to validate our approach. Nevertheless, the analysis of security conflicts is currently done by simulation and in a non-exhaustive manner. Our future work will aim to assist/automate the analysis by allowing the definition of properties in temporal logic for instance which will be automatically controlled
Cambier, Valentin. "Horloge à réseau optique à atomes de mercure exploitant un 2D-MOT : durée de vie de l'état 3P0 et mesures de fréquence". Thesis, Sorbonne université, 2019. http://www.theses.fr/2019SORUS512.
Testo completoOptical clocks have changed time and frequency metrology since the beginning of the 2000’s. In my thesis, I worked on a mercury optical lattice clock. Mercury is a promising candidate for optical clocks thanks to its weak sensitivity to blackbody radiation shift. During my PhD, I took benefit of a magneto optical trap in two dimensions (2D-MOT) to pre-cool the mercury atoms before the interrogation phase. It allows us not only to trap much more atoms but also to improve the clock cycle by decreasing the total cycle time. These improvements made possible the lifetime measurement of the 3P0 state and to participate to measurement campaigns at the European scale between different clocks located a few hundreds of kilometres apart. As a consequence, it was possible to measure for the first time the frequency ratio between mercury and Yb+ ion
Santini, William. "Caractérisation de la dynamique hydro-sédimentaire du bassin de l'Ucayali (Pérou), par une approche intégrant réseau de mesures, télédétection et modélisation hydrologique". Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30276.
Testo completoBecause increasing climatic variability and anthropic pressures have affected the sediment dynamics of large tropical rivers, long-term sediment concentration series have become crucial for understanding the related socio-economic and environmental impacts. The large size of this basin requires an integrated approach to dynamically monitor sediment flows, by coupling in-situ data, remote sensing (water colour and spatial altimetry), calibration/validation measurement campaigns, and hydrological modelling. This is why this problem has been approached by identifying two grain size modes that dominate the process of sediment transport in the major rivers of the Amazon basin. On the one hand, the silts and small aggregates, which can be monitored at the water surface by satellite, and on the other hand, the fine sands in graded suspension, invisible to satellites, but whose transport can be modelled by equations derived from hydraulics.In order to link the surface suspended sediment concentration, measured by satellite, and the average concentration in a river reach, a physical formulation is proposed (Santini et al., 2019) and validated from an exceptional hydro-sedimentary dataset collected in the Peruvian Amazon as part of the SO HyBAm activities. This model is also a powerful tool for optimizing water column sampling and in situ concentration monitoring in large rivers. The hydraulic parameters required for its application, but also for the laws of transport capacity used to simulate sand flows, are derived from the semi-distributed SWAT hydrological model. The latter was used to simulate the hydrological cycle in a 350,000 km² test basin, the Ucayali. This basin, which is the main branch of the Amazon River, discharges 12,000 m3 s-1 of water and exports 293 106 t year-1 of sediment to the Amazon River. Complex intra-annual hydro-sedimentary dynamics have thwarted the water and sediment routing approaches implemented in the SWAT model. In particular, the effectsof flooding on the river flood wave propagation, which seasonally control sedimentation and sediment recycling processes in the basin. New hydraulic and sedimentary routing modules have therefore been implemented into the model, taking into account the above-mentioned effects.The modified SWAT model allows an excellent simulation of daily flows at the Ucayali outlet (Nasch of 0.94), average velocity, and water levels. These hydraulic parameters are then used for the application of transport capacity laws to calculate a sand flow, and for the use of the physical model to link the satellite fine particle concentration to an average concentration. This approach thus makes it possible, based on the conventional in situ network and on “virtual” stations where flows are monitored by simulation and satellite, to propose a detailed and extended dynamic assessment for the Ucayali basin
Lanier, Sandy. "Mise au point d’un mortier de piégeage à réseau poreux contrôlé". Thesis, Centrale Lille Institut, 2020. http://www.theses.fr/2020CLIL0027.
Testo completoThis PhD is part of the MACH3project funded by the French Investment Plan (PIA) -2nd phase. It contributes to the management of tritiated radioactive waste produced by the ITER fusion facility. The acceptance of this waste on a storage site requires a low rate of degassing of Tritium (radioactive isotope of H2). This research has developed cement mortars for conditioning tritiated nuclear waste,making it possible to limit the degassing of tritium by irreversible trapping of its gaseous forms. Composite mortars were formulated, based on conventional Portland cement, and integrating a hydrogen getter (Ag2O/MnO2), meeting the safety criteria of a radioactive waste storage facility and complying with the industrial specifications. After three months of maturation, their trapping performance, without preliminary drying, is between 75 and 95% (measured following a gamma irradiation test, generating H2in situ)
Vautier, Alexandre. "Fouille de données sans information a priori sur la structure de la connaissance : application à l’analyse de journaux d’alarmes réseau". Rennes 1, 2008. ftp://ftp.irisa.fr/techreports/theses/2008/vautier.pdf.
Testo completoThe aim of this thesis is to propose a data mining framework for discovering knowledge when the user has no a priori information about the knowledge structure. The proposed framework is generic and based on the category theory, more precisely on the sketches. We propose the concept of relational sketches that enhances the sketches with the concepts of power set and relation. This framework enables the specification of various data types and various data mining algorithms. The execution of data mining algorithms for model extraction is enabled by the unification of algorithm specifiations with the data specification. A generic methodology, based on the Kolmogorov complexity, is proposed to evaluate the model quality and their ability to summarize the data. The evaluation essentially relies on the covering relation that links the model and data. The application which motivated this work is an analysis of network alarm logs from France Télécom. The first application focuses on the summarization of unstructured VPN alarms. The second application concerns the analysis of network flows from the internet "backbone" to detect DDoS attacks
Desgeorges, Loïc. "Détection d'anomalies de sûreté et sécurité d'un contrôle centralisé de réseau". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0150.
Testo completoSoftware Defined Networking (SDN) architectures have been introduced with the objective of providing centralized control by a controller. A consequence of this centralization is that only one entity is in charge of control. As a result, this makes the controller the preferred target for an attack on an SDN architecture.Such an attack would allow an attacker to have a global view on the network, to set up a control aimed at degrading the service etc. Moreover, a simple failure of the controller is also a threat to the network since it would deprive it of control.It can be found in the literature that the multi-controller architecture has been introduced to strengthen the control scheme against these threats. However, such an architecture brings new specificities and to ensure consistency between controllers, a communication interface between them is necessary. This interface constitutes a security threat since an attacker can propagate malicious and erroneous information about the network to other controllers.With this in mind, this work aims to introduce a multi-controller architecture without a communication interface between them. This architecture is composed of a nominal controller in charge of computing the data plan and a second one in charge of detecting anomalies in the decisions taken by the main controller.For this purpose, the behavior of the control activity has been formalized in the form of a extit{template}: in response to a request from the network infrastructure, the controller must set up a data plan within a certain time interval.To be considered abnormal, the controller must respect this but it is not enough. The content of the data plan must then be checked and for this structural properties defining what is considered to be a consistent data plan are introduced. These properties are necessary but not sufficient and consequently a detection method has been proposed according to the type of control considered: deterministic or not. In the deterministic case, the internal variables of the controller are estimated from the coherent decisions taken and observed. Then, it is necessary to verify that the controller does not contradict himself because of the determinism hypothesis. This method is therefore no longer applicable to the non-deterministic case and we propose to establish a likelihood score for the decisions taken by the controller. This score is established according to a multi-criteria approach whose choice of criteria depends on the application case. Here, two criteria have been proposed: verification that the impact of the decisions taken by the controller is plausible and verification that the sequence of decisions taken by the controller is plausible.This method is evaluated according to two types of metrics: reactivity and number of correct decisions made by the controller (precision and recall) in various study cases.In conclusion, the performances show that the proposed methods are applicable but have limitations. Moreover, this work lays the foundations of a detection method but each application is specific to the case study considered
Levillain, Olivier. "Une étude de l’écosystème TLS". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0014.
Testo completoSSL/TLS, a 20-year old security protocol, has become a major component securing network communications, from HTTPS e-commerce and social network sites to Virtual Private Networks, from e-mail protocols to virtually every possible protocol. In the recent years, SSL/TLS has received a lot of attentions, leading to the discovery of many security vulnerabilities, and to protocol improvements. In this thesis, we first explore the SSL/TLS ecosystem at large using IPv4 HTTPS scans, while proposing collection and analysis methodologies to obtain reproducible and comparable results across different measurement campaigns. Beyond these observations, we focused on two key aspects of TLS security: how to mitigate Record Protocol attacks, and how to write safe and efficient parsers. Finally, building on the numerous implementation flaws in almost all TLS stacks in the last years, we propose some thoughts about the challenges in writing a secure TLS library
Danisch, Maximilien. "Mesures de proximité appliquées à la détection de communautés dans les grands graphes de terrain". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066166/document.
Testo completoMany kinds of data can be represented as a graph (a set of nodes linked by edges). In this thesis, I show that two major problems, community detection and the measure of the proximity between two nodes have intricate connexions. Particularly, I will present a framework that, using a proximity measure, can isolate a set of nodes. Its general principle is rather straightforward and can be described as follows. Given a node of interest in a graph, the proximity of all nodes in the network to that node of interest is computed. Then, if a small set of nodes have a high proximity to the node of interest while all other have a small proximity, we can directly conclude that the small set of nodes is the community of the node of interest. I'll then show how to tweak this idea to (i) find all communities of a given node, (ii) complete a set of nodes into a community and (iii) find all overlapping communities in a network. I will validate these methods on real and synthetic network datasets
Golléty, Claire. "Fonctionnement (métabolisme et réseau trophique) d'un système intertidal rocheux abrité, la zone à Ascophyllum nodosum, relation avec la biodiversité algale et animale". Paris 6, 2008. http://www.theses.fr/2008PA066451.
Testo completoKabouche, Riad. "Caractérisations de composants et Conceptions de circuits à base d’une filière émergente AlN/GaN pour applications de puissance en gamme d’ondes millimétriques". Thesis, Lille 1, 2017. http://www.theses.fr/2017LIL10200/document.
Testo completoGallium Nitride (GaN) technology is now the ideal candidate for high power applications in the millimeter wave range. The characteristics of this material enable high voltage operation at high frequency, as illustrated by its breakdown field and high electron saturation velocity. This research work has initially allowed the development of a test bench capable of "Large Signal" characterization, called LoadPull up to Q band, in continuous-wave and pulsed mode of this emerging technology. Indeed, the high power density generated by the GaN technology has made the development of this bench unavoidable and relatively unique. In addition, this study has focused on the characterization of several innovative types of devices that have demonstrated state-of-the-art performance, with a power added efficiency (PAE) above 46% associated to a power density of 4.5 W/mm obtained for an operating frequency of 40 GHz in continuous-wave. Finally, this work aimed the design and fabrication of two power amplifiers on silicon substrate (based on the industrial OMMIC technology) in the Ka-band, showing the possibility of achieving MMIC type circuits from advanced GaN transistors technology. These two amplifiers were designed for specific purposes: combining high power and high PAE performance and pushing bandwidth limits
Rouffort, Clément. "Théorie de champ-moyen et dynamique des systèmes quantiques sur réseau". Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S074/document.
Testo completoThis thesis is dedicated to the mathematical study of the mean-field approximation of Bose gases. In quantum physics such approximation is regarded as the primary approach explaining the collective behavior appearing in large quantum systems and reflecting fundamental phenomena as the Bose-Einstein condensation and superfluidity. In this thesis, the accuracy of the mean-field approximation is proved in full generality as a consequence only of scaling and symmetry principles. Essentially all the known results in the subject are recovered and new ones are proved specifically for quantum lattice systems including the Bose-Hubbard model. On the other hand, our study sets a bridge between the Gross-Pitaevskii and Hartree hierarchies related to the BBGKY method of statistical physics with certain transport or Liouville's equations in infinite dimensional spaces. As an outcome, the uniqueness property for these hierarchies is proved in full generality using only generic features of some related initial value problems. Again, several new well-posedness results as well as a counterexample to uniqueness for the Gross-Pitaevskii hierarchy equation are proved. The originality in our works lies in the use of Liouville's equations and powerful transport techniques extended to infinite dimensional functional spaces together with Wigner probability measures and a second quantization approach. Our contributions can be regarded as the culmination of the ideas initiated by Z. Ammari, F. Nier and Q. Liard in the mean-field theory
Olague, Gustavo. "Planification du placement de caméras pour des mesures 3D de précision". Phd thesis, Grenoble INPG, 1998. http://tel.archives-ouvertes.fr/tel-00004898.
Testo completo