Literatura científica selecionada sobre o tema "Techniques d'identification et d'authentification"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Techniques d'identification et d'authentification".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Techniques d'identification et d'authentification"
Ohmaid, Hicham, S. Eddarouich, A. Bourouhou e M. Timouya. "Comparison between SVM and KNN classifiers for iris recognition using a new unsupervised neural approach in segmentation". IAES International Journal of Artificial Intelligence (IJ-AI) 9, n.º 3 (1 de setembro de 2020): 429. http://dx.doi.org/10.11591/ijai.v9.i3.pp429-438.
Texto completo da fonteLacroix, M., L. Vézina, S. Desjardins e C. Beaulieu. "Comparaison de techniques d’identification des Erwinia et des Pseudomonas responsables de la pourriture molle". Phytoprotection 76, n.º 1 (12 de abril de 2005): 27–37. http://dx.doi.org/10.7202/706082ar.
Texto completo da fonteDrouin, Patrick. "Une méthodologie d'identification automatique des syntagmes terminologiques : l'apport de la description du non-terme". Meta 42, n.º 1 (30 de setembro de 2002): 45–54. http://dx.doi.org/10.7202/002593ar.
Texto completo da fonteEberlin, Philippe. "L’identification acoustique sous-marine des navires-hôpitaux". Revue Internationale de la Croix-Rouge 70, n.º 774 (dezembro de 1988): 527–41. http://dx.doi.org/10.1017/s0035336100080606.
Texto completo da fonteBocquentin, Marie, Marc Vuillet, Jean-Marie Cariolet, Serge Lhomme e Youssef Diab. "Vers une meilleure prise en compte des défaillances en cascade au sein des réseaux franciliens interdépendants face aux crues majeures". La Houille Blanche, n.º 1 (fevereiro de 2020): 70–78. http://dx.doi.org/10.1051/lhb/2020009.
Texto completo da fonteMasneuf-Pomarède, Isabelle, e Denis Dubourdieu. "Comparaison de deux techniques d'identification des souches de levures de vinification basées sur le polymorphisme de l'ADN génomique: réaction de polymérisation en chaine (PCR) et analyse des caryotypes (électrophorèse en champ pulsé)". OENO One 28, n.º 2 (30 de junho de 1994): 153. http://dx.doi.org/10.20870/oeno-one.1994.28.2.1150.
Texto completo da fonteAmblard, C., J. C. Boisson, G. Bourdier, D. Fontvieille, X. Gayte e T. Sime-Ngando. "Écologie microbienne en milieu aquatique : des virus aux protozoaires". Revue des sciences de l'eau 11 (12 de abril de 2005): 145–62. http://dx.doi.org/10.7202/705336ar.
Texto completo da fonte"Entrée en vigueur de la version amendée de l'Annexe I au Protocole I relative aux moyens techniques d'identification des installations et moyens de transport sanitaires". Revue Internationale de la Croix-Rouge 76, n.º 805 (fevereiro de 1994): 29–30. http://dx.doi.org/10.1017/s0035336100089036.
Texto completo da fonteTeses / dissertações sobre o assunto "Techniques d'identification et d'authentification"
Nastasiu, Dragos-Florin. "Développement de solutions pour l’identification (THID) et l’authentification par des approches non intrusives dans le domaine THz". Electronic Thesis or Diss., Chambéry, 2024. http://www.theses.fr/2024CHAMA007.
Texto completo da fonteTHz imaging is an emerging field since the technological advances in terms of THz radiation emission and detection equipment. The main objective of the thesis is to contribute and to improve THz imaging systems, from image reconstruction and analysis to image classification tasks. In the first part of the thesis, we tackle the amplitude estimation challenge under ideal and multiplicative noise conditions. The multiplicative noise deforms the phase and introduces complex artefacts, such as contour information loss and contrast degradation, that cannot be eliminated using state-of-the-art image reconstruction techniques. In this regard, we introduce five novel reconstruction methods which exploit the phase diagram representation of signals. Two of the methods are based on phase-diagram match filtering to estimate the amplitude in both conditions. Another two methods use the concept of dynamic time warping (DTW) to increase the capability to model the multiplicative type of noise. Lastly, we exploit the dynamic of the phase trajectory described by the curvatures to reconstruct the image. From the large pool of methods, we evaluate throughout the thesis that the curvature-based method efficiently reconstructs the image in both ideal and noisy contexts. After an efficient image reconstruction, the second part of the thesis, we study image analysis and classification methods considering the instabilities of real-world imaging systems, such as translations and rotations. In this sense, we propose to use translation and rotation invariant wavelet packet decompositions, that provide a unique and optimal representation of an image, regardless if the image is translated or rotated. Based on the invariant image representations, novel feature extraction techniques are introduced such as vertical, horizontal, N-directional and N-zonal frameworks. Additionally, two feature structures are introduced and that consider the frequency partitioning of the wavelet decomposition and are adapted to work with Graph Neural Networks (GNNs) and classic ML classifiers such as k-nearest neighbors (k-NN), support vector machine (SVM), etc. Overall, our proposed approaches increase the accuracy of all classifiers
Etrog, Jonathan. "Cryptanalyse linéaire et conception de protocoles d'authentification à sécurité prouvée". Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0025.
Texto completo da fonteThis Ph. D, devoted to symmetric cryptography, addresses two separate aspects of cryptology. First, the protection of messages using encryption algorithms and, second, the protection of privacy through authentication protocols. The first part concerns the study of linear cryptanalysis while the second is devoted to the design of authentication protocols with proven security. Although introduced in the early 90s, linear cryptanalysis has recently experienced a revival due to the development of new variants. We are both interested in its practical and theoretical aspects. First, we present a cryptanalysis of a reduced version of SMS4, the encryption algorithm used in WiFi in China then, second, we introduce multilinear cryptanalysis and describe a new form of multilinear cryptanalysis. The second part of the thesis concerns the study of RFID authentication protocols respecting privacy. We define a model to formalize the notions of security for these protocols. Then we propose two protocols, each one performing a compromise between strong unlinkability and resistance to denial of service attacks, which allow low-cost implementations. We establish security proofs in the standard model for these two protocols
Dejean, Marie. "Nouvelles techniques de protection et d'authentification d'imprimés de valeur". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0181.
Texto completo da fonteThe security of valuable documents (banknotes) is essential to prevent counterfeiting. In this context, we have developed optical techniques that guarantee protection and authentication of valuable documents by creating visual effects induced by the observer’s motion parallax. In particular, we have focused on multiscopy using a two-dimensional microlens array and micro-images. First, we have developed a protection system by applying spatialen cryption through the use of off-center Fresnel lenses. The micro-images are adapted accordingly, so that a symbol appears at a precise angle. The protection results from the necessary association of both arrays (microlenses and micro-images). Second, we have developed new visual effects, based on non monotonic motion-in-depth. The kinetics of the seeffects is very characteristic and is a way to authenticate the documents thanks to impressive effects. The multiscopic systems scaling leads to a barrier to miniaturizing these systems, since they require a very high resolution for the micro-images. Solutions have been proposed to use accessible resolutions while satisfying the specifications. Because of the encountered technological difficulties, we have also explored a completely different type of system, only based on the phenomenon of specular reflection. Reflective micro-structures create luminous contrast and movement effects also thanks to parallax motion. This technique allows to create simple but very fluid movements unlike microlenses that allow complex movements and objects but jerky trajectories. Finally, we present a comparison between the various technique with the advantages and disadvantages of each one
Dousteyssier, Buvat Hélène. "Sur des techniques déterministes et stochastiques appliquées aux problèmes d'identification". Université Joseph Fourier (Grenoble), 1995. http://tel.archives-ouvertes.fr/tel-00346058.
Texto completo da fonteDousteyssier, Buvat Hélène Blum J. "Sur des techniques déterministes et stochastiques appliquées aux problèmes d'identification". S.l. : Université Grenoble 1, 2008. http://tel.archives-ouvertes.fr/tel-00346058.
Texto completo da fonteDolveck-Guilpart, Bénédicte. "Deux problèmes de représentation et d'identification d'un milieu à partir de sondages". Montpellier 2, 1989. http://www.theses.fr/1989MON20222.
Texto completo da fonteHilal, Alaa. "Système d'identification à partir de l'image d'iris et détermination de la localisation des informations". Thesis, Troyes, 2013. http://www.theses.fr/2013TROY0021/document.
Texto completo da fonteIris identification system is considered among the best biometric technologies. However problems related to the segmentation of the iris and to the normalization of iris templates are generally reported and induce loss of recognition performance. In this work three main contributions are made to the progress of the iris identification system. A new segmentation method is developed. It approximates the outer iris boundary with a circle and segments accurately the inner boundary of the iris by use of an active contour model. Next, a new normalization method is proposed. It leads to a more robust characterization and a better sampling of iris textures compared to traditional normalization methods. Finally using the proposed iris identification system, the location of discriminant characteristics along iris templates is identified. It appears that the most discriminant iris characteristics are located in inner regions of the iris (close to the pupil boundary) and that the discriminant capabilities of these characteristics decreases as outer regions of the iris are considered. The developed segmentation and normalization methods are tested and compared to a reference iris identification system over a database of 2639 iris images. Improvement in recognition performance validates the effectiveness of the proposed system
Poisson, Olivier. "Nouvelles techniques du traitement du signal et d'identification pour l'analyse des perturbations de la tension". Paris 6, 1998. http://www.theses.fr/1998PA066595.
Texto completo da fonteGrivel, Éric. "Contribution au rehaussement du signal de parole par filtrage de Kalman : reformulation de techniques d'identification et modèles harmoniques". Bordeaux 1, 2000. http://www.theses.fr/2000BOR10510.
Texto completo da fonteLampron, Cinthia. "La métaphore comme outil d'identification et de suivi des perceptions subjectives face à une démarche de changement". Sherbrooke : Université de Sherbrooke, 2002.
Encontre o texto completo da fonteLivros sobre o assunto "Techniques d'identification et d'authentification"
Patenaude, Pierre. L'expertise en preuve pénale: Les sciences et techniques modernes d'enquête, de surveillance et d'identification. Cowansville, QC: Éditions Y. Blais, 2003.
Encontre o texto completo da fonteMulti-sensor multi-target data fusion, tracking and identification techniques for guidance and control applications =: Les techniques de poursuite et d'identification multi-cibles á base de fusion multi-sensor appliquées au guidage et au pilotage. Neuilly-sur-Seine: AGARD, 1996.
Encontre o texto completo da fonte