Rozprawy doktorskie na temat „Internet des objets – Environnement”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Internet des objets – Environnement”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Patel, Pankesh. "Environnement de développement d'applications pour l'Internet des objets". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2013. http://tel.archives-ouvertes.fr/tel-00927150.
Pełny tekst źródłaKhalil, Ahmad. "Gestion autonome de la qualité de service et de la sécurité dans un environnement Internet des objets". Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK068.
Pełny tekst źródłaNowadays, the Internet of Things (IoT) is becoming important in our daily lives thanks to technological advances. This paradigm aims to improve the quality of human life through automating several tasks. In this context, service level guarantee within IoT environments is a major challenge while considering a massive deployment of IoT applications and services as well as extending their usage to different domains. The IoT service level can be characterized in two parts: Quality of Service (QoS) and security. Moreover, this service level must be managed in an autonomic manner within the IoT environment given the heterogeneity and the size of its infrastructure making it difficult, even impossible, their management in a manual manner by the administrators. In this thesis, we propose a QoS based channel access control mechanism, called QBAIoT (QoS Based Access for IoT environments), to ensure a differentiated processing of existing traffics in the IoT environment. The differentiated processing allows satisfying the requirements of each traffic according to different QoS parameters (i.e., delay, jitter, packet delivery ratio, etc.). Then, QBAIoT is improved and upgraded to integrate self-management capabilities thanks to two important functions of the closed control loop: self-configuration and self-optimization. In addition, to offer a better QoS within the IoT environment, it is necessary to optimize the energy consumption of resources’ constrained components. Thus, we propose an adaptation of QBAIoT allowing to reduce its energy consumption in an autonomic manner while respecting the data accuracy. Our contribution concerning the second part of service level guarantee within an IoT environment, which is security, consists is a mechanism enabling IoT objects access control to IoT gateways, called IoT-MAAC (IoT Multiple Attribute Access Control). This mechanism takes into account different parameters that are specific to IoT environments (i.e., IoT object trust, IoT object identifier, IoT object fingerprint, etc.). Finally, the decision making process regarding IoT object access control is autonomously managed by IoT gateways and aims to meet the requirements of IoT environment in terms of trust
Tran, Thi Thanh Huong. "Be innovative to be green : how consumers respond to eco-innovative product designs". Electronic Thesis or Diss., Université de Lille (2018-2021), 2018. http://www.theses.fr/2018LILUA018.
Pełny tekst źródłaThe introduction of eco-innovation is considered an effective way for companies to strategically align themselves with consumers’ increasing environmental concerns. Drawing on the sustainability and innovation literature, this dissertation proposes that product design factors, individual differences, and situational variables, significantly influence consumer responses to eco-innovation. The findings of five online experiments explore the underlying mechanisms of how consumers respond to eco-innovative product designs across various Internet-of-Things product categories. Specifically, we uncover the effect of trade-offs between innovative features and eco-friendly benefits on consumer responses and shine new light on the moderating role of consumer beliefs about eco-friendly product effectiveness (Study 1). Our results also show that different types of eco-friendly attributes in new product designs trigger different consumer responses (Study 2). Moreover, this dissertation sheds light on the nature of eco-friendly consumer innovativeness and its interaction effects with perceived trade-offs in eco-innovative product designs on consumers’ product evaluation and purchase intentions (Study 3). We also document consumers’ associations between detachability of an eco-friendly attribute on consumer responses (Study 4). Finally, we highlight that consumers’ evaluations of eco-innovation hinge on ecological country of manufacture and its congruence with product eco-friendliness (Study 5). The dissertation concludes with theoretical and managerial implications, such as advice for firms on the best practices for competitive advantage achievement in an eco-innovation context
Houzangbe, Samory. "Impact sur l'expérience utilisateur en environnement virtuel immersif de l'utilisation d'objets connectés portés pour la rétroaction physiologique". Thesis, Paris, ENSAM, 2019. http://www.theses.fr/2019ENAM0011/document.
Pełny tekst źródłaThe internet of things has now entered every home and, with a society more and more focused towards wellness, these sensors measure and offer henceforth a wide variety of physiological data. Virtual reality technologies reaching maturity, coupled with the advent of the internet of things, allow consequently new opportunities to propose improved immersive experiences. If we identify nowadays many virtual reality studies reporting the usage of physiological data, they mainly use medical equipment, which poses strong usability constraints, is often cumbersome and limits mobility. In an attempt to overcome these limitations, this study therefore focuses on the original usage of smart wearables as substitutes for traditional sensors in immersive applications. Thus, this thesis is positioned halfway between a technological feasibility study and a fundamental user experience study.In this context, the objective of our study is to contribute to knowledge about the impact of the use of physiological data in immersive virtual environments. More precisely, the impact of biofeedback, via off-the-shelf smart wearables, on user engagement and the sense of agency. We have thus carried out two experiments allowing us to study the impacts of the different biofeedback modalities on user experience. Our first experiment implements a biofeedback based on heart rate in a virtual reality horror game, allowing to enhance the feeling of fear. The results of this experiment confirm the interest of using smart wearables to capture physiological data for immersive virtual reality experiences. They also highlight the positive impact of this biofeedback on user engagement. The second experiment focuses on the use of cardiac activity as a mandatory interaction mechanism. This experiment is divided into two parts, the first one quantifying the participants’ level of competency in heartrate control and the second one immersing them in a series of tasks in virtual reality ; heartrate control is necessary to complete the different steps of the experience. The results of this experiment demonstrate the possibility of using the said interaction mechanic for virtual reality experiences and indicate a positive impact on the sense of agency, linked with the level of competency of the participants. On a theoretical level, this thesis proposes a synthesis of user experience models in virtual environment and submit the foundations of a model that we call "physiological immersion"
Duquennoy, Simon. "Smews : un système d'exploitation dédié au support d'applications Web en environnement contraint". Thesis, Lille 1, 2010. http://www.theses.fr/2010LIL10184/document.
Pełny tekst źródłaThe context of this thesis is the extension of Web technologies to ambient computing. The resulting Web of Things allows novel interactions by guaranteeing interoperability at both network and applications levels. We address the design of the software system behaving as a Web server and embedded in strongly constrained devices such as smart cards or sensors. The state of the art solutions allowing to run a lightweight standard protocol stack involve poor performances and sacrifice the system features. The thesis is that by dedicating an operating system to the support of a high-level family of applications, we can produce an efficient software consuming a few resources. We study an architecture based on an macro-kernel integrating the hardware management, the communications stack and the applications container, providing an interface that fits the applications needs
Piette, Ferdinand. "Intergiciel agent pour le déploiement et la configuration d'applications distribuées dans des environnements ambiants". Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066058/document.
Pełny tekst źródłaResearch domains like Ambient Intelligence or Internet of Things came up in the early 2000’s with the technologic improvement and the ongoing miniaturization of electronic devices. These electronic and information devices are scattered in the user’s environment, can communicate and exchange data more and more easily to provide intelligent and non-intrusive services to the users. However, it is difficult to have generic implementations of these applications. These difficulties are due the the high heterogeneity and dynamicity of the ambient environments. Vertical integrations of connected devices (data exchanges from the devices to external servers) allow more interoperability but generate overloads of the communication channels and privacy concerns. To prevent these problems, horizontal approaches (connected devices communicate directly together through the hardware infrastructure) have to be encouraged. In this thesis work, we address the problem of the automatic deployment and configuration of distributed applications in these ambient environments. We propose mechanisms that allow, from a description of the environment, the selection and the configuraion of the hardware entities that will support the execution of applications. These mechanisms are encapsulated in a middleware based on the multi-agent paradigm. The different agents of the system cooperate in order to select the right hardware entities that respects the requirements and the constraints of the applications we want to deploy
Mansour, Elio. "Détection d’évènements dans des environnements connectés". Thesis, Pau, 2019. http://www.theses.fr/2019PAUU3017/document.
Pełny tekst źródłaThe rising interest in smart connected environments (e.g., smart buildings, cities, factories) and theevolution of sensors, data management/communication technologies have paved the way forinteresting and useful applications that help users in their every day tasks (e.g. increasing comfort,reducing energy consumption). However, various improvements are still required. For instance, howto enhance the representation of such complex, dynamic, and heterogeneous environments.Moreover, how to facilitate the interaction between users and their connected environments, and howto provide tools for environment monitoring and management.In this thesis, we focus on four main challenges: (i) representing a diverse set of components andelements related to the environment and its sensor network; (ii) providing a query language thathandles user/connected environment interactions (e.g., environment definition, data management,event definition); (iii) coping with the dynamicity of the environment and its evolution over time; and(iv) proposing a generic event detection mechanism for improved environment monitoring.To do so, we first present an ontology-based data model that represents hybrid environments/sensornetworks. Thus covering diverse sensors (e.g., static, mobile), environments (e.g., infrastructures,devices), and data (e.g., scalar, multimedia). Then, we introduce a query language that one might usefor various tasks (e.g., defining the connected environment, information retrieval, event definition,data management). Furthermore, to keep up with the environment changes we provide a queryoptimizer that allows the submitted queries to cope with the dynamicity of the environment prior totheir execution. Finally, we propose an event detection core that takes event definitions as input anddetects the targeted events.We group the aforementioned modules in one global framework for event detection in connectedenvironments. Our proposal is generic, extensible, and could be used with different connectedenvironments such as buildings, cities. .
Amroun, Hamdi. "Modèles statistiques avancés pour la reconnaissance de l’activité physique dans un environnement non contrôlé en utilisant un réseau d’objets connectés". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS406/document.
Pełny tekst źródłaWith the arrival of connected objects, the recognition of physical activity is experiencing a new era. New considerations need to be taken into account in order to achieve a better treatment process. In this thesis, we explored the treatment process for recognizing physical activity in an uncontrolled environment. The recognized physical activities, with only one inertial unit (accelerometer, gyroscope and magnetometer), are called elementary. Other types of context-dependent activities are called "context-based". We extracted the DCT as the main descriptor for the recognition of elementary activities. In order to recognize the physical activities based on the context, we defined three levels of granularity: a first level depending on embedded connected objects (smartphone, smartwatch and samrt TV . A second level concerns the study of participants' behaviors interacting with the smart TV screen. The third level concerns the study of participants' attention to TV. We took into consideration the imperfection aspect of the data by merging the multi sensor data with the Dempster-Shafer model. As such, we have proposed different approaches for calculating and approximating mass functions. In order to avoid calculating and selecting the different descriptors, we proposed an approach based on the use of deep learning algorithms (DNN). We proposed two models: a first model consisting of recognizing the elementary activities by selecting the DCT as the main descriptor (DNN-DCT). The second model is to learn raw data from context-based activities (CNN-raw). The disadvantage of the DNN-DCT model is that it is fast but less accurate, while the CNN-raw model is more accurate but very slow. We have proposed an empirical study to compare different methods that can accelerate learning while maintaining a high level of accuracy. We thus explored the method of optimization by particle swarm (PSO). The results are very satisfactory (97%) compared to deep neural network with stochastic gradients descent and Nesterov accelerated Gradient optimization. The results of our work suggest the use of good descriptors in the case where the context matters little, the taking into account of the imperfection of the sensor data requires that it be used and faster models
Roux, Jonathan. "Détection d'intrusion dans des environnements connectés sans-fil par l'analyse des activités radio". Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30011.
Pełny tekst źródłaThe massive deployment of connected objects, forming the Internet of Things (IoT), is now disrupting traditional network environments. These objects, previously connectivity-free, are now likely to introduce additional vulnerabilities into the environments that integrate them. The literature today paints an unflattering picture of the security of these objects, which are increasingly becoming prime targets for attackers who see them as new exploitable surfaces to penetrate previously secure environments. In addition, the wireless means of communication used by these objects are numerous, with very heterogeneous characteristics at all protocol levels. Particularly in terms of the frequencies used, which make it difficult to analyse and monitor the environments that are equipped with them. These issues, and in particular the strong heterogeneity of these numerous protocols, call into question the traditional solutions used to ensure the security of the exchanges carried out. However, the explosion in the number of these objects requires security architectures that are adapted to these new issues. In this thesis, we are interested in monitoring and detecting anomalies that may occur in any wireless means of communication used in the IoT. We found a critical lack of solutions with the ability to analyze all exchanges, regardless of the protocol used. To answer this question, we propose a new security architecture based on the monitoring of physical radio signals, making it possible to free oneself from protocol knowledge and therefore to be generic. Its objective is to learn the model of legitimate radio behaviour in an environment using radio probes, then to identify deviations from this model, which may correspond to anomalies or attacks. The description of this architecture is the first contribution of this thesis. We then studied the applicability of our solution in different contexts, each with its own characteristics. The first study, corresponding to our second contribution, consists in proposing an implementation and deployment of our approach in connected homes. The evaluation of the latter in the face of real attacks injected into radio space and its results show the relevance of our approach in these environments. Finally, the last contribution studies the adaptation and deployment of our generic solution to professional environments where the presence of expert users promotes the integration of advanced diagnostic information to identify the origins of an anomaly. The subsequent evaluation and the results associated with each of the diagnostic mechanisms implemented demonstrate the value of our approach in heterogeneous environments
Christophe, Benoit. "Semantic based middleware to support nomadic users in IoT-enabled smart environments". Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066669/document.
Pełny tekst źródłaWith the growth in Internet of Things, the realization of environments composed of diverse connected resources (devices, sensors, services, data, etc.) becomes a tangible reality. Together with the preponderant place that smartphones take in the daily life of users, these nascent smart spaces pave the way to the development of novel types of applications; carried by the phones of nomadic users and dynamically reconfiguring themselves to make use of such appropriate connected resources. Creating these applications however goes hand-in-hand with the design of tools supporting the nomadic users roaming in these spaces, in particular by enabling the efficient selection of resources. While such a selection calls for the design of theoretically grounded descriptions, it should also consider the profile and preferences of the users. Finally, the rise of (possibly mobile) connected resources calls for designing a scalable process underlying this selection. Progress in the field is however sluggish especially because of the ignorance of the stakeholders (and the interactions between them) composing this eco-system of “IoT-enabled smart environments”. Thus, the multiplicity of diverse connected resources entails interoperability and scalability problems. While the Semantic Web helped in solving the interoperability issue, it however emphasizes the scalability one. Thus, misreading of the ecosystem led to producing models partially covering connected resource characteristics.Revolving from our research works performed over the last 6 years, this dissertation identifies the interactions between the stakeholders of the nascent ecosystem to further propose formal representations. The dissertation further designs a framework providing search capabilities to support the selection of connected resources through a semantic analysis. In particular, the framework relies on a distributed architecture that we design in order to manage scalability issues. The framework is embodied in a VR Gateway further deployed in a set of interconnected smart places and that has been assessed by several experimentations
Piette, Ferdinand. "Intergiciel agent pour le déploiement et la configuration d'applications distribuées dans des environnements ambiants". Electronic Thesis or Diss., Paris 6, 2017. http://www.theses.fr/2017PA066058.
Pełny tekst źródłaResearch domains like Ambient Intelligence or Internet of Things came up in the early 2000’s with the technologic improvement and the ongoing miniaturization of electronic devices. These electronic and information devices are scattered in the user’s environment, can communicate and exchange data more and more easily to provide intelligent and non-intrusive services to the users. However, it is difficult to have generic implementations of these applications. These difficulties are due the the high heterogeneity and dynamicity of the ambient environments. Vertical integrations of connected devices (data exchanges from the devices to external servers) allow more interoperability but generate overloads of the communication channels and privacy concerns. To prevent these problems, horizontal approaches (connected devices communicate directly together through the hardware infrastructure) have to be encouraged. In this thesis work, we address the problem of the automatic deployment and configuration of distributed applications in these ambient environments. We propose mechanisms that allow, from a description of the environment, the selection and the configuraion of the hardware entities that will support the execution of applications. These mechanisms are encapsulated in a middleware based on the multi-agent paradigm. The different agents of the system cooperate in order to select the right hardware entities that respects the requirements and the constraints of the applications we want to deploy
Zannas, Konstantinos. "Développement de capteurs RFID passifs dédiés au monitoring des groupes alternateurs". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT119.
Pełny tekst źródłaIn the context of the Internet of Things and the industrial revolution 4.0, new technologies are expected to offer solutions in several industrial related problems. The RFID technology and its evolution to a sensing solution is very promising and could potentially find application in the industrial environment. The work of this thesis was carried out in the context of Innov’Hydro project with the participation of several academic and industrial partners. The main goal of the Innov’Hydro project was to explore new sensing solutions for the harsh industrial environment of hydroelectric power-plants and especially in the interior of the generators. The bulky generators of the power-plants are susceptible to break downs due to the oxidation of high current conducting parts. One solution to avoid such break downs is to monitor the temperature and/or the deformation in the interior of the generators and especially of the vulnerable parts. In order to monitor these parts, the small size, the high accuracy and a potential passive operation of the sensors are critical attributes of the sensing solution. All these attributes can be found in the UHF RFID technology and the recently introduced concept of sensor-tags. Therefore, by utilizing novel RFID sensor-tag designs and RFID configurations, the possibility of temperature and stress sensing in the real environment of the hydroelectric power-plants is explored in depth. A series of measurements and tests are conducted in both laboratory and real industrial environment with promising results
Christophe, Benoit. "Semantic based middleware to support nomadic users in IoT-enabled smart environments". Electronic Thesis or Diss., Paris 6, 2015. http://www.theses.fr/2015PA066669.
Pełny tekst źródłaWith the growth in Internet of Things, the realization of environments composed of diverse connected resources (devices, sensors, services, data, etc.) becomes a tangible reality. Together with the preponderant place that smartphones take in the daily life of users, these nascent smart spaces pave the way to the development of novel types of applications; carried by the phones of nomadic users and dynamically reconfiguring themselves to make use of such appropriate connected resources. Creating these applications however goes hand-in-hand with the design of tools supporting the nomadic users roaming in these spaces, in particular by enabling the efficient selection of resources. While such a selection calls for the design of theoretically grounded descriptions, it should also consider the profile and preferences of the users. Finally, the rise of (possibly mobile) connected resources calls for designing a scalable process underlying this selection. Progress in the field is however sluggish especially because of the ignorance of the stakeholders (and the interactions between them) composing this eco-system of “IoT-enabled smart environments”. Thus, the multiplicity of diverse connected resources entails interoperability and scalability problems. While the Semantic Web helped in solving the interoperability issue, it however emphasizes the scalability one. Thus, misreading of the ecosystem led to producing models partially covering connected resource characteristics.Revolving from our research works performed over the last 6 years, this dissertation identifies the interactions between the stakeholders of the nascent ecosystem to further propose formal representations. The dissertation further designs a framework providing search capabilities to support the selection of connected resources through a semantic analysis. In particular, the framework relies on a distributed architecture that we design in order to manage scalability issues. The framework is embodied in a VR Gateway further deployed in a set of interconnected smart places and that has been assessed by several experimentations
Hu, Zheng. "Auto-configuration, supervision et contrôle d'entités physiques par l'intermédiaire de réseaux de capteurs et actionneurs". Thesis, Lyon 1, 2014. http://www.theses.fr/2014LYO10001/document.
Pełny tekst źródłaThe physical entities which are taken into account by Machine to Machine (M2M) telecom applications are more and more heterogeneous. The challenge addressed by our research is the automatic integration and configuration of all these types of physical entities in M2M systems, with a homogeneous solution that generalizes self-configuration approaches used for networked digital devices. This thesis presents a general theoretical framework and basic mechanisms for the identification and configuration of such physical entity models in distributed embedded information systems. Our approach deals jointly with equipment and space entities encompassing the ”Internet of Things” (IoT) and ”interactive environment” viewpoints in a renewed interpretation of ambient intelligence. This work has been motivated initially by home energy management applications, trying to integrate into the Home Area Network all home entities that play a role in energy management, but do not have a networked interface of their own. This corresponds to a qualitative extension of the perimeter of the Home Area Network. This integration is achieved in a way similar to what is done for state of the art digital devices, through a spontaneous discovery and configuration mechanism, with the following stages: detection of the presence of a physical entity by analyzing the coincidence of significant events detected by sensors; selection of the first generic model corresponding to the detected physical entity from a reference ontology, on the basis of received sensors data; creation of a software component representing the detected physical entity, based on the selected model, associated with relevant sensors and actuators; provision of application interface for monitoring and control of the target entity through this intermediate software component; iterative update of the identified entity model on the basis of data from associated sensors. The proposed approach has been validated and implemented in home environments, but it is intended to be generalized and expanded to environments such as buildings or cities, offering a similarly shared infrastructure for all M2M applications in these environments
Tran, Thi Thanh Huong. "Be innovative to be green : how consumers respond to eco-innovative product designs". Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A018/document.
Pełny tekst źródłaThe introduction of eco-innovation is considered an effective way for companies to strategically align themselves with consumers’ increasing environmental concerns. Drawing on the sustainability and innovation literature, this dissertation proposes that product design factors, individual differences, and situational variables, significantly influence consumer responses to eco-innovation. The findings of five online experiments explore the underlying mechanisms of how consumers respond to eco-innovative product designs across various Internet-of-Things product categories. Specifically, we uncover the effect of trade-offs between innovative features and eco-friendly benefits on consumer responses and shine new light on the moderating role of consumer beliefs about eco-friendly product effectiveness (Study 1). Our results also show that different types of eco-friendly attributes in new product designs trigger different consumer responses (Study 2). Moreover, this dissertation sheds light on the nature of eco-friendly consumer innovativeness and its interaction effects with perceived trade-offs in eco-innovative product designs on consumers’ product evaluation and purchase intentions (Study 3). We also document consumers’ associations between detachability of an eco-friendly attribute on consumer responses (Study 4). Finally, we highlight that consumers’ evaluations of eco-innovation hinge on ecological country of manufacture and its congruence with product eco-friendliness (Study 5). The dissertation concludes with theoretical and managerial implications, such as advice for firms on the best practices for competitive advantage achievement in an eco-innovation context
Masri, Ghaida. "Ecoo : Environnement de Conception Orientée Objets". Lyon, INSA, 1990. http://www.theses.fr/1990ISAL0091.
Pełny tekst źródłaSoftware Production is an activity which needs the application of disciplined process Preliminar Design is the phase of this process in which systems are decomposed into modules, and their topol~gy is produced. The application of Sof tware Engineering principles during this. Phase such as modularity, encapsulation, and reusability become a necessity to control the development of large software systems and improve their quality and reliability. For this purpose, it was interesti_ng to develop a supporting tool for a preliminary design method : Object Oriented Design introduced by Grady Booch. This method is based upon the concept of Object and support the previous principles. ECOO is a tool which provides assistance in : - guiding designer along steps of OOD - document acquisition, archiving and retrieval abject and operation identification by morphosyntaxic analysis - grouping abjects and operations which act upon them, into modules - editing the formal interfaces of the modules - consulting a bank of reusable abjects for retrieval and integration of objects
HU, Zheng. "Auto-configuration, supervision et contrôle d'entités physiques par l'intermédiaire de réseaux de capteurs et actionneurs". Phd thesis, Université Claude Bernard - Lyon I, 2014. http://tel.archives-ouvertes.fr/tel-00948995.
Pełny tekst źródłaGirod, Xavier. "Conception par objets : mecano : une Méthode et un Environnement de Construction d'ApplicatioNs par Objets". Phd thesis, Grenoble 1, 1991. http://tel.archives-ouvertes.fr/tel-00339536.
Pełny tekst źródłaLemoine, Frédéric. "Internet des Objets centré service autocontrôlé". Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1235/document.
Pełny tekst źródłaIn the digital era, the number of connected objects continues to grow and diversify. To support this increasing complexity, we wanted to bring a maximum of automatisms to the Internet of Things in order to guarantee end-to-end quality of service (QoS). To do this, a self-controlled service component is proposed to integrate the object into the digital ecosystem. Thanks to the calibration of each service, which makes it possible to know the behaviour, an automated composition becomes possible. We have illustrated the feasibility of our approach on a case study. We also have shown how connected objects can assemble themselves, cooperating to achieve a common objective, while meeting global QoS requirements
Lemoine, Frédéric. "Internet des Objets centré service autocontrôlé". Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1235.
Pełny tekst źródłaIn the digital era, the number of connected objects continues to grow and diversify. To support this increasing complexity, we wanted to bring a maximum of automatisms to the Internet of Things in order to guarantee end-to-end quality of service (QoS). To do this, a self-controlled service component is proposed to integrate the object into the digital ecosystem. Thanks to the calibration of each service, which makes it possible to know the behaviour, an automated composition becomes possible. We have illustrated the feasibility of our approach on a case study. We also have shown how connected objects can assemble themselves, cooperating to achieve a common objective, while meeting global QoS requirements
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques". Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0018/document.
Pełny tekst źródłaAccording to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques". Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0018.
Pełny tekst źródłaAccording to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Bondu, Mathilde. "Ethique et objets connectés". Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/67170.
Pełny tekst źródłaCe projet de recherche porte sur l’opportunité de l’éthique comme mode de régulation des objets connectés. Actuellement au cœur d’une véritable course à l’innovation se faisant de plus en plus pressante, nous relèverons qu’il s’agit de biens complexes rendant difficile leur appréhension par le droit. Ce sujet se focalisera ensuite sur le cadre juridique applicable à cette technologie au regard des données personnelles récoltées de manière massives pour pouvoir enrichir et assurer le fonctionnement de ces objets. Démontrant certaines limites de ce régime légal au regard du poids de l’économie de la donnée, l’éthique sera étudiée de manière théorique dans le contexte du numérique comme outil de régulation, y compris son utilité mais aussi son inévitable manipulation par les acteurs du numérique. Ce projet aura pour objectif enfin de dresser un bilan concret des initiatives véritablement destinées à assurer une meilleure régulation des objets connectés par l’éthique, finalement débitrice d’une forte collaboration entre les trois acteurs principaux du numérique : pouvoirs publics, entreprises et citoyens.
LAUNAY, PASCALE. "Generation de programmes paralleles distribues dans un environnement a objets". Rennes 1, 1999. http://www.theses.fr/1999REN10088.
Pełny tekst źródłaHammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006.
Pełny tekst źródłaInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Pełny tekst źródłaInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Aïssaoui, François. "Autonomic Approach based on Semantics and Checkpointing for IoT System Management". Thesis, Toulouse 1, 2018. http://www.theses.fr/2018TOU10061/document.
Pełny tekst źródłaCiortea, Andrei-Nicolae. "Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets". Thesis, Lyon, 2016. http://www.theses.fr/2016EMSE0813/document.
Pełny tekst źródłaThe Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features
Bouchereau, Aymeric. "Les objets connectés au service de l'apprentissage". Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCC018.
Pełny tekst źródłaLearning - a vital principle of evolution - ensures the transformation of primary data captured by our senses into useful knowledge or abstract and general ideas that can be used in new situations and contexts. Cognitive neuroscience shows that the mechanisms of learning are stimulated by cognitive (e.g. wondering, evaluating errors), physical (e.g. manipulating, moving) and social (e.g. debating, collaborating) engagement. The learner builds knowledge through experience, by exploring his environment, formulating hypotheses and experimenting.Learning is crucial in a context where the exponential evolution of information and communication technologies is changing objects, practices and uses. The development of the Internet of Things (IoT) transforms common objects (e.g. light bulbs, watches, cars) into connected devices (CD) that can collect data and act on the user's environment. Learning becomes both biological and artificial and allows the creation of artificial intelligence systems (AIS) that analyse large volumes of data to automate tasks and assist individuals.Technologies can support learning when the technical possibilities they offer are used to support the process of knowledge construction. Thus, this thesis focuses on learning in the context of IoT and examines how the specificities of CD can be articulated with the mechanisms of learning.In order to identify the characteristics of learning in the context of IoT, we studied existing uses of CD. Based on the state of the art, we proposed a conceptual tool describing the IoT through four dimensions of analysis: Data, Interfaces, Agents and Pervasiveness. This tool enabled us to identify, list, classify and ultimately analyse the uses of CD for learning. In the context of these uses, learning is characterised by physical commitment, contextualisation of knowledge and bringing pedagogical activities closer to reality.Building on the results of this initial work, we have developed an approach to put the specificities of CD to learn sciences. The abstract and often counter-intuitive aspect of scientific knowledge hinders their learning, partly because our perception of reality is subjective and limited by our senses. However, data collected by CD and analysed by AIS provide information about the environment that can be used to extend human perception.Therefore, the objective of our approach, translated by the Data - Representations - Interactions (DRI) model, aims at exploiting OCs and SIAs to facilitate the observation of physical phenomena. According to the DRI model, the learner interacts with representations of a physical phenomenon generated by CD and AIS. In accordance with the mechanisms of learning (e.g. constructivism, role of experience), the learner is led to make observations and manipulations, formulate hypotheses and test them. In order to evaluate the effects and constraints of the DRI model, we have designed LumIoT devices dedicated to the learning of photometric quantities (e.g. luminous flux, luminous intensity, illuminance). Then, we conducted an experiment with 17 students of the Master 1 Multimedia Products and Services of the University of Franche-Comté (Montbéliard).The results of the experiment show that the LumIoT devices, based on the DRI model, have facilitated the observation and understanding of photometric quantities. By making abstract knowledge accessible, the DRI model paves the way for learning devices using CD and AIS to mediate knowledge
Guessoum, Zahia. "Un environnement opérationnel de conception et de réalisation de systèmes multi-agents". Paris 6, 1996. http://www.theses.fr/1996PA066577.
Pełny tekst źródłaAzzi, Rachid. "Environnement de développement de simulateurs pédagogiques de procédés industriels". Lyon, INSA, 1995. http://www.theses.fr/1995ISAL0104.
Pełny tekst źródłaThe efficient operation of production systems shows off the constant personal Training problem. This training is essential because of the prohibitive costs needed to remedy major incidents. Furthermore, the long period of any new operator training, the economic constraints and the real risks when using the production system, make needful the design and the development of pedagogic simulators. Simulation as a training tool allows, via reasonable delays and costs, the improvement of operation procedures mastership, the incident detection and how to react according to security and production criteria. The goal of this report is to propose an environment of developping educational simulators. We have developed a specification tool allowing industrial plant description (structural, functional and behavioural) and a simulation tool for scenario running
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
Pełny tekst źródłaThe interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Roos, Jean-François. "Mise au point d'applications distribuées pour environnement de développement basé sur une technologie objet". Lille 1, 1994. http://www.theses.fr/1994LIL10019.
Pełny tekst źródłaSantamaria, Luca. "Systèmes d'antennes reconfigurables intégrés dédiés aux réseaux IoT sans fil dynamiques". Thesis, Université Côte d'Azur, 2021. http://www.theses.fr/2021COAZ4103.
Pełny tekst źródłaBecause of the unique characteristics of the Internet of things (IoT), such as massive volume of data, stringent resource constraints, and heterogeneous activity levels, future wireless IoT infrastructures must integrate smart self-organizing solutions to efficiently operate in the dynamic IoT environment.Within this context, this thesis presents the development of innovative integrated reconfigurable antenna systems capable of adapting to such dynamic and multi-purposed wireless IoT networks.As a first step, the thesis covers the design of antennas suitable for integration in IoT terminals when specific radiation properties or multi-band operations are needed. Both antenna structures and integration techniques are presented for single and multi-band IoT applications. Next, a design methodology based on a multi-access single structure antenna and a miniaturized omnidirectional circularly polarized antenna for IoT applications are presented. Successively, an approach based on Neural Networks (NN) to estimate the performance of small antennas given practical constraints is presented. As proof of concept, the case of printed antennas integrated into compact terminals is considered.In the second part, the thesis focuses on the development of compact and low-power-consuming reconfigurable antennas. In order to enable new applications, such as wearable communications, and to deliver higher performance in a variety of integration environments, a flexible, reconfigurable antenna is presented. To guarantee reliable operation, flexible antennas must maintain proper electrical or radiation characteristics despite the variation of their structure given by the flexibility. Consequently, the reconfiguration mechanism of the proposed antenna allows the shift of the antenna resonance, making the antenna capable of maintaining an acceptable impedance matching over the operating band even when the antenna is folded.A compact high gain and front-to-back ratio pattern reconfigurable antenna for spatial filtering in IoT networks is then proposed. The reconfiguration mechanism is based on the use of a low-insertion, low-on resistance SP4T switch, which can be numerically controlled by a microcontroller, as required by IoT applications. Successively, a slot-based electronically steerable parasitic array radiator (ESPAR) antenna suitable for IoT applications is presented. The work describes in-depth the design procedure of the antenna, addressing the practical implementation of the reconfiguration mechanism, and focusing on the realization of the prototype and its experimental evaluation.Finally, a methodology for synthesizing parasitic antenna arrays is proposed. The method is based on the use of a Particle Swarm Optimizer (PSO), which iteratively optimizes the parasitic element loads until the desired pattern behavior is obtained. In order to assess the method's ability to address the desired goals, the methodology is used to optimize the directivity, the front-to-back ratio, and the gain of compact parasitic array antennas for IoT devices. The impedance loads values identified with this approach are integrated into the antenna structures to realize the parasitic antenna array. Reconfiguration can then simply be obtained by rotating the load's values over the parasitic elements
Lenormand, Emmanuel. "Communication par événements dans les modèles à objets". Phd thesis, Université Joseph Fourier (Grenoble), 1996. http://tel.archives-ouvertes.fr/tel-00345373.
Pełny tekst źródłaCombes, Catherine. "Un environnement de modelisation pour les systemes hospitaliers". Clermont-Ferrand 2, 1994. http://www.theses.fr/1994CLF21655.
Pełny tekst źródłaClaeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Pełny tekst źródłaThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Domenger, Jean-Philippe. "Conception et réalisation du noyau d'un environnement 2D 1/2 d'édition d'images discrètes". Bordeaux 1, 1992. http://www.theses.fr/1992BOR10634.
Pełny tekst źródłaBenadjaoud, Ghazi Nourdine. "Dee : Un environnement d'échange de données pour l'intégration des applicatons". Ecully, Ecole centrale de Lyon, 1996. http://www.theses.fr/1996ECDL0027.
Pełny tekst źródłaMebrek, Adila. "Fog Computing pour l’Internet des objets". Thesis, Troyes, 2020. http://www.theses.fr/2020TROY0028.
Pełny tekst źródłaFog computing is a promising approach in the context of the Internet of Things (IoT) as it provides functionality and resources at the edge of the network, closer to end users. This thesis studies the performance of fog computing in the context of latency sensitive IoT applications. The first issue addressed is the mathematical modeling of an IoT-fogcloud system, and the performance metrics of the system in terms of energy consumed and latency. This modeling will then allow us to propose various effective strategies for content distribution and resource allocation in the fog and the cloud. The second issue addressed in this thesis concerns the distribution of content and object data in fog / cloud systems. In order to simultaneously optimize offloading and system resource allocation decisions, we distinguish between two types of IoT applications: (1) IoT applications with static content or with infrequent updates; and (2) IoT applications with dynamic content. For each type of application, we study the problem of offloading IoT requests in the fog. We focus on load balancing issues to minimize latency and the total power consumed by the system
Patrigeon, Guillaume. "Systèmes intégrés adaptatifs ultra basse consommation pour l’Internet des Objets". Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS036.
Pełny tekst źródłaThe Internet of Things is an infrastructure enabling advanced services by interconnecting things. Although the large variety of Internet of Things applications involve many kinds of technical solutions, many of those are based on a typical architecture that can be divided in three layers: the perception layer, the transport layer and the services layer. The dispositive that composed the perception layer, called “sensor nodes”, are subject of technical requirements: size, security, reliability, autonomous, and long lifetime. Sensor nodes’ energy efficiency is the most critical point where traditional technologies show their limitations. New strategies and solutions are proposed to overcome this technical challenge; however, how can those be evaluated, with which tools and at which level? How emerging technologies can be optimized and integrated inside microcontrollers for Internet of Things applications? Which are the new strategies for energy management to adopt with technologies such as 28 nm FD-SOI and non-volatiles memories? What are their limitations? Will they be sufficient?To evaluate the integration of emerging technologies inside low power microcontrollers, we propose a new methodology using an FPGA-based sensor node prototyping platform. Able to operate in already deployed wireless sensor networks, we use it to perform fast and precise evaluations, taking account of the application context. We studied and evaluated multiple memory architecture configurations based on STT magnetic memories as a replacement of traditional solutions, and showed that the non-volatile STT memory technology can improve a microcontroller’s energy efficiency for embedded applications
Baudry, Philippe. "Un langage visuel d'interrogation de bases de données objets dans un environnement d'administration de réseaux". Versailles-St Quentin en Yvelines, 1998. http://www.theses.fr/1998VERS0006.
Pełny tekst źródłaFace a la relative complexite et la diversite des langages de requetes offerts par les systemes de gestion de bases de donnees objets, des interfaces visuelles commencent a apparaitre afin de permettre a un utilisateur d'acceder graphiquement aux donnees de la base. Cependant les familles d'interfaces existantes presentent un certain nombre d'inconvenients, lies pour le principal aux modes de construction des requetes proposees, ainsi qu'aux possibilites d'interrogations offertes souvent restreintes. L'interface visuelle presentee dans cette these se denomme cmis query builder. Elle est integree dans la plateforme d'administration de systeme et reseaux ism developpee par la societe bull. Cette interface constitue un systeme complet d'interrogation de bases de donnees objets dans un environnement cmis. Le mode de construction d'une requete repose sur une approche de style graphe, en faisant ici une nette distinction entre la definition de la requete et son execution. L'utilisateur construit sa requete en dessinant l'arbre hierarchique des classes a interroger, sur lesquels il peut definir des operateurs (26 au total). La definition de variables permet, en plus du mode de calcul apporte, d'etablir des liens entre classes et apporte une interpretation semantique supplementaire de la base interrogee. Les operateurs sont pour la plupart inspires de l'algebre relationnelle, mais appliques a un environnement objet et hierarchique. Leur description formelle apporte au langage visuel un pouvoir d'expression comparable a sql. Une requete ainsi construite constitue une methode pour une classe executable sur n'importe quel objet de la classe. Une requete peut etre sauvegardee sous forme d'objets, permettant sa re-edition ou son execution en mode graphique au programme. La transparence vis-a-vis du langage sous-jacent permet des extensions possibles de l'interface comme l'interrogation de bases de donnees objets non cmis, ou relationnelles
Adomnicai, Alexandre. "Cryptographie légère pour l'internet des objets : implémentations et intégrations sécurisées". Thesis, Lyon, 2019. https://tel.archives-ouvertes.fr/tel-02868017.
Pełny tekst źródłaWhile the internet of things (IoT) promises many advances for businesses, administrations and citizens, its deployment is a real challenge in terms of privacy and security. In order to ensure the confidentiality and the authenticity of information transmitted by these objects, numerous IoT protocols incorporate cryptographic algorithms within their specification. To date, these algorithms are the same as the ones used in traditionnal internet security protocols and thus, have not been designed with constrainted plateforms in mind. This thesis focuses on lightweight cryptography which aims at reduce as much as possible the cost of its implementation.Apart from the main goal of lightweight cryptography which is to consume less ressources than traditional algorithms, it is also valuable to take into account the integration of countermeasures against physical attacks during the design phase in order to limit their impact. Although this kind of attacks require a physical access to the target, this can be a realistic scenario as connected objets might be deployed everywhere and thus, potentially accessible by malicious people. Our works focus on the study of three lightweight cryptographic algorithms, each having a potential for industrial applications. Especially, we highlight the need of secure implementations by introducing two new side-channel attacks : one against ChaCha20, standardized by the IETF and now used in TLS 1.3, and another one against ACORN, an algorithm being part of the CAESAR portfolio
Kamgueu, Patrick Olivier. "Configuration dynamique et routage pour l'internet des objets". Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0241/document.
Pełny tekst źródłaIn recent years, the growing interest of scientific and industrial community has led to the standardization of new protocols that consider the unique requirements of Wireless Sensor Networks (WSN) nodes. At network layer, RPL (IPv6 Routing Protocol for Low-power and Lossy Network) has been proposed by IETF as the routing standard for network that uses LLN nodes, namely, those where both nodes and their interconnects are constrained. They operate on low-power embedded batteries and use lossy links, making communications unreliable and lead to a significant data loss rates. This thesis aims to optimize the routing in WSNs (especially those using TCP/IP protocol stack), as well as their efficient and cost-effective connection to the Internet. First, we have proposed two new RPL objective functions. The first uses as unique routing criterion, the node remaining energy with the goal of maximizing the network lifetime. An energy model that allows the nodes to dynamically estimate their remaining energy at runtime has been implemented and integrate to the protocol. The second objective function uses fuzzy logic reasoning to combine several criteria to take Quality of Service into account. Indeed, this scheme provides a good trade-off on several inputs and requires a low memory footprint. In the last part of this thesis, we designed and implemented an architecture that enable an efficient integration of several RPL based WSNs to the Internet to achieve the Internet of Things vision
Fritz, Christophe. "Etude et réalisation d'un environnement de simulation orienté objet, intégration dans le logiciel PROUESSE". Mulhouse, 1994. http://www.theses.fr/1994MULH0458.
Pełny tekst źródłaZarrad-Rekik, Saoussen. "La création artisanale entre ancrage culturel et environnement touristique : (le cas tunisien)". Paris 1, 2008. http://www.theses.fr/2008PA010540.
Pełny tekst źródłaMoudoud, Hajar. "Intégration de la Blockchain à l’Internet des Objets". Electronic Thesis or Diss., Troyes, 2022. http://www.theses.fr/2022TROY0006.
Pełny tekst źródłaThe Internet of Things (IoT) is transforming traditional industry into a smart industry where decisions are made based on data. The IoT interconnects many objects that perform complex tasks. However, the intrinsic characteristics of the IoT lead to several problems, such as decentralization and privacy and security issues. Blockchain has emerged as a key technology to address the challenges of IoT. Due to its salient features such as decentralization, immutability, and security, blockchain has been proposed to establish trust in several applications, including IoT. The integration of blockchain with IoT opens the door to new possibilities that inherently improve trustworthiness, reputation, and transparency for all parties involved, while enabling security. However, conventional blockchains are computationally expensive, have limited scalability, and require high bandwidth, making them unsuitable for resource constrained IoT environments. The main objective of this thesis is to use blockchain as a key tool to improve IoT. To achieve our goal, we address the challenges of data reliability and security in IoT by using blockchain as well as new emerging technologies, including artificial intelligence
Bouneffa, Mourad. "Gestion des objets complexes : modélisation, évolution et intégration". Nancy 1, 1995. http://www.theses.fr/1995NAN10336.
Pełny tekst źródłaBadawi, Marwan. "Objets synoptiques décrivant des processus d'intéraction génériques à des agents automnomes dan un environnement virtuel informe". Rennes, INSA, 2006. http://www.theses.fr/2006ISAR0018.
Pełny tekst źródłaIn this thesis we propose an informed environment based on synoptic objects which contain a synopsis of the interactions they can undergo. Since the nature of an object stays invariant regardless of the entity interacting with it, synoptic objects contain generic interaction information. Through the use of interactive surfaces we manage to describe the surfaces of interest on the object itself and the space affected by the object during interaction. Then, by defining a set of seven primitive basic actions, the objects can describe the interaction process through these actions to any agent implementing them. The description of the interaction process is done through complex actions which indicate the order in which the basic actions need to be accomplished and what to do depending on the result of the undertaken action
Badawi, marwan Arnaldi Bruno. "Objets synoptiques décrivant des processus d'intéraction génériques à des agents automnomes dan un environnement virtuel informe". (S.l.) : (s.n.), 2006. ftp://ftp.irisa.fr/techreports/theses/2006/badawi.pdf.
Pełny tekst źródła