Добірка наукової літератури з теми "Contrôle basé sur des règles"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Contrôle basé sur des règles".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Contrôle basé sur des règles"
Saoudi, Messaoud. "Le contrôle des principes budgétaires applicables aux lois de financement de la Sécurité sociale." Gestion & Finances Publiques, no. 6 (November 2023): 15–22. http://dx.doi.org/10.3166/gfp.2023.6.003.
Повний текст джерелаMbenga, Joseph Kaciunga. "Le contrôle juridictionnel de la rupture du contrat de travail pour faute lourde en RD Congo." KAS African Law Study Library - Librairie Africaine d’Etudes Juridiques 8, no. 4 (2021): 505–21. http://dx.doi.org/10.5771/2363-6262-2021-4-505.
Повний текст джерелаKonan, Kouadio Eugene, and Romaric Amani. "Apports des images LANDSAT à la dynamique de l’occupation du sol et à l'analyse des conflits d’usage dans le département de Dianra au nord de la Côte d’Ivoire." Revue Française de Photogrammétrie et de Télédétection 223 (January 26, 2022): 232–49. http://dx.doi.org/10.52638/rfpt.2021.518.
Повний текст джерелаHansen, Ole. "Public Law by Contract: The Reluctant Creation of Private Markets for Welfare Service." European Review of Private Law 25, Issue 3 (June 1, 2017): 619–49. http://dx.doi.org/10.54648/erpl2017039.
Повний текст джерелаReynaud, Jean-Daniel. "La régulation sociale." II. Transformations du travail et de ses approches, no. 25 (November 5, 2015): 121–26. http://dx.doi.org/10.7202/1033916ar.
Повний текст джерелаÉthier, Benoit. "Nehirowisiw Kiskeritamowina." Recherches amérindiennes au Québec 44, no. 1 (December 17, 2014): 49–59. http://dx.doi.org/10.7202/1027879ar.
Повний текст джерелаOlogeanu-Taddei, Roxana, Cameron Guthrie, and Samuel Fosso-Wamba. "Beyond TAM: the impact of trust, privacy control and reliability on an individual’s intention to use a coronavirus contact tracing App." Management international 27, no. 3 (2023): 40–54. http://dx.doi.org/10.59876/a-4x1b-x300.
Повний текст джерелаDocquier, Frédéric, and Michel Beine. "Fédéralisme fiscal dans un modèle de zone monétaire optimale." Revue économique 48, no. 3 (May 1, 1997): 519–27. http://dx.doi.org/10.3917/reco.p1997.48n3.0519.
Повний текст джерелаMasson, Paul R. "Les effets à long terme de différentes règles de financement du gouvernement." Articles 59, no. 2 (July 21, 2009): 266–82. http://dx.doi.org/10.7202/601216ar.
Повний текст джерелаDouat, Étienne. "Les cavaliers budgétaires dans la jurisprudence constitutionnelle récente." Gestion & Finances Publiques, no. 5 (September 2023): 6–11. http://dx.doi.org/10.3166/gfp.2023.5.002.
Повний текст джерелаДисертації з теми "Contrôle basé sur des règles"
Cardot, Anaïs. "Rejeu basé sur des règles de transformation de graphes." Thesis, Poitiers, 2019. http://www.theses.fr/2019POIT2254.
Повний текст джерелаIn many modelling fields, such as architecture, archaeology or CAD, performing many variations of the same model is an expanding need. But building all those variations manually takes time. It is therefore needed to use automatic technics to revaluate some parts of a model, or even an entire model, after the user specifies the modifications. Most of the existing approaches dedicated to revaluating models are based on a system called parametric modelling. It is made of two parts, a geometric model and a parametric specification, which allows to record the series of operation that created the model, and the different parameters of those operations. This way, the user can change some parameters, or edit the list of operations to modify the model. To do so, we use a system called persistent naming, introduced during the 90ies, that allows us to identify and match the entities of an initial specification and the ones of a revaluated specification. In this thesis, our goal is to propose a persistent naming system that would be general, homogeneous and that would allow the user to edit a parametric specification (which means move, add, or delete some operations). We base our system on the Jerboa library, which uses graph transformation rules. This way, we will be able to use those rules to create our naming system, while also linking the notions of graph transformation rules and parametric specification. We will then describe how to use our naming method to revaluate or edit parametric specifications. Finally, we will compare our method with the other ones from the literature
Lavoie, Marc-André. "Développement et contrôle d'un bras robotique basé sur l'actionneur différentiel élastique." Mémoire, Université de Sherbrooke, 2009. http://savoirs.usherbrooke.ca/handle/11143/1494.
Повний текст джерелаOuedraogo, Sarah. "Développement de Stratégies Optimisées de Gestion de l’Energie Intermittente dans un Micro Réseau Photovoltaïque avec Stockage." Electronic Thesis or Diss., Corte, 2023. http://www.theses.fr/2023CORT0008.
Повний текст джерелаMicrogrids are considered as the future of energy production and distribution in electrical grid. Many of them incorporate photovoltaic generation and storage, mostly in the form of batteries, to power various loads. The main objective of this thesis is to propose energy management strategies designed to optimize the operating costs of a photovoltaic microgrid with battery while respecting specific constraints. This microgrid powers residential buildings and electric vehicles.To achieve this, five energy management strategies based on rules, with increasing complexity, were developed. These strategies were compared to an optimization using linear programming in terms of energy and economic performance. The results indicate that the most optimal strategy achieved a performance level close to the linear programming, which is considered "optimal." However, some limitations were observed for the initial strategies, including power cuts, which are not acceptable. To improve these strategies, the seasonal effect, particularly in photovoltaic production, was taken into account, eliminating power cuts. Depending on the chosen strategy, the batteries are more or less stressed, so it was necessary to consider the varying battery aging and its impact on performance. Suitable battery aging models were thus implemented. The results showed that the profitability of batteries depends on their installation cost and they remain economically viable for costs below approximately 175 €/kWh. The most effective rule-based control strategy considers variations in electricity costs, photovoltaic production forecasting, seasonal variation in PV production, and battery degradation in its decision-making process. This strategy improves financial gain by approximately 68 % compared to the simplest rule-based strategy, which is similar to a self-consumption strategy.An analysis of the influence of different parameters, such as electricity purchase tariffs, battery capacity, power exchanged with the main grid and consumption profiles was conducted through simulations. It was found that the electricity pricing model has a significant effect on energy distribution and financial gain. The influence of battery size, limitation of power exchange with the main grid, and consumption profile strongly depends on the strategy used, as well as the electricity pricing model.This work highlights the importance of integrating the characteristics of photovoltaic energy into energy management strategies through the use of various tools such as photovoltaic production forecasting. This information is valuable for investment and operational decision-making
Ghadi, Abderrahim. "Modèle hiérarchique de contrôle d'accès d'UNIX basé sur un graphe de rôles." Strasbourg, 2010. http://www.theses.fr/2010STRA6005.
Повний текст джерелаConcerning access control, can the following question be addressed : "Is the access control system decidable ?". In other words : is it true that starting from a safe state of protection, we can assume at any time that is no intrusion which will endanger our system ?. In order to answer this question, we propose to model the access control system in the form of a graph of roles. The roles, which represent the vertices of graph contain, according to the security-policy, certain number of privileges. Every privilege represents one or several access rights on a given object. We presented two methods of use of this graph : The first consists in using an algorithm, which we developed by basing itself on the algorithms of the theory of the graphs, permit to search all over the path of the graph in order to find illicit privilege transfer. The second consists in storing our graph in a directory LDAP, this which brings us to develop a new plan LDAP to represent our graph of roles
Knotek, Michal. "Diagnostic de fautes basé sur l'analyse temporelle." Phd thesis, Université Joseph Fourier (Grenoble), 2006. http://tel.archives-ouvertes.fr/tel-00110429.
Повний текст джерелаun rôle primordial dans l'amélioration de la disponibilité opérationnel le
des équipements. Dans les systèmes industriels, une part importante
(jusqu'à 80%) est consacrée à la maintenance, test et diagnostic. Pour
des systèmes complexes, la résolution des problèmes liés au diagnostic
et d'une manière générale de la supervision nécessite la mise en oeu-
vre d'une approche générique. Le diagnostic concerne les deux phases
indissociables de détection et de localisation. Dans cette thèse nous
proposons une approche dynamique de diagnostic pour les systèmes à
événements discrets. L'approche proposée basée sur l'exploitation du
temps, est applicable à tout système dont l'évolution dynamique dépend
non seulement de l'ordre des événements discrets mais aussi de la durée
des tâches associées comme pour les processus de communication ou les
processus batch. Dans cette thèse, le diagnostic des fautes est réalisé
grâce à l'implémentation d'un modèle basé sur l'utilisation des auto-
mates temporisés. L'objectif est de concevoir un observateur pour un
système donné, qui permet de détecter et localiser les éventuel les dé-
fail lances du procédé. Cet observateur est appelé “diagnoser”. Une
défail lance est constatée lorsque le séquencement temporel en sortie est
incorrect. Nous présentons donc les différentes étapes de la démarche
de diagnostic : la construction du diagnoser, la vérification du modèle
ainsi qu'une l'application de la démarche sur un exemple réel avec son
extension aux systèmes hybrides.
Maurice, François. "Un modèle d'évaluation et d'amélioration d'entités logicielles basé sur l'utilisation de métriques." Toulouse 3, 1996. http://www.theses.fr/1996TOU30192.
Повний текст джерелаKomarova, Maryna. "Authentification rapide et contrôle d'accès basé sur la confiance dans les réseaux sans fil hétérogène." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00003793.
Повний текст джерелаKomarova, Maryna. "Authentification rapide et contrôle d'accès basé sur la confiance dans les réseaux sans fil hétérogènes." Paris, ENST, 2008. http://pastel.archives-ouvertes.fr/pastel-00003793/fr/.
Повний текст джерелаIn this thesis, we study the current situation and trends in wireless technologies development. We discuss the problems related to security mechanisms specific to each technology, and in particular the possibilities for integration and interworking. We first study the possibility of authentication latency decreasing in a scenario where the network access authentication is decoupled from the service access authentication. An authorized user is granted network and service access as a result of a single authentication process that combines 802. 1X and PANA operations. Then we introduce the Fast re-Authentication Protocol (FAP) for inter-domain roaming, which aims to reduce the authentication delay for a mobile user in a visited administrative domain. The approach eliminates the need for communication between the target and the user's home networks for credentials verification. We develop the Fast re-Authentication Protocol by suggesting a ticket distribution scheme for inter-domain roaming. This method decreases the number of tickets sent and consequently the overhead and delay of the ticket acquisition phase of the protocol. Numerical results obtained from experiments on a test-bed and a series of simulations show that the proposed scheme enhances inter-domain handover parameters such as authentication latency and signalling cost. To improve the access control to network resources we propose the adjustable trust model. The purpose of this work is to provide the network with the opportunity to react to user behaviour. Users are motivated to gain higher trust because trusted users have access to a larger set of services with higher quality of service. Validation of the proposed trust-based access control method has been done via simulations. Finally, we discuss how the proposed solutions can be implemented in a single framework
Moussa, Kaouther. "Estimation de domaines d'attraction et contrôle basé sur l'optimisation : application à des modèles de croissance tumorale." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT078.
Повний текст джерелаThe main objective of this thesis is to propose frameworks and algorithms that are based on advanced control approaches, in order to guide cancer treatments scheduling. It also aims at pointing out the importance of taking into account the problem of stochastic uncertainties handling in the drug scheduling design, since cancer dynamical systems are considered to be highly uncertain phenomena.Cancer dynamical interactions are still an open research topic which is not fully understood yet. The complexity of such dynamics comes from their partially unknown behavior and their uncertain nature. Additionally, they are often described by nonlinear complex dynamics and require taking into consideration many constraints related to physiology as well as biology.In terms of control design, this topic gathers many complexity ingredients such asnonlinear dynamics, constraints handling and optimality issues. Therefore, in this thesis, we propose to use a recent optimal control approach that is based on moment optimization. This framework has the advantage of considering all the state and input variables as probability densities, allowing therefore to explicitly consider parametric as well as initial state uncertainties in the optimal control problem. We use this framework in Part II, in order to design robust optimal control schedules that represent cancer drugs injection profiles.The second problem that we address in Part III consists in the estimation of regionsof attraction for cancer interactions models. This problem is interesting in the context of cancer treatment design, since it provides the set of all possible initial conditions (tumor and patient health indicators), that can be driven to a desired targeted safe region, where the patient is considered to be healed. Furthermore, we focus on the assessment of methodologies that take into consideration the parametric uncertainties that can affect the dynamical model
Voiry, Matthieu. "Étude et conception d'un système automatisé de contrôle d'aspect des pièces optiques basé sur des techniques connexionnistes." Thesis, Paris Est, 2008. http://www.theses.fr/2008PEST0077/document.
Повний текст джерелаIn various industrial fields, the problem of diagnosis is of great interest. For example, the check of surface imperfections on an optical device is necessary to guarantee its operational performances. The conventional control method, based on human expert visual inspection, suffers from limitations, which become critical for some high-performances components. In this context, this thesis deals with the design of an automatic system, able to carry out the diagnosis of appearance flaws. To fulfil the time constraints, the suggested solution uses two sensors working on different scales. We present one of them based on Normarski microscopy, and the image processing methods which allow, starting from issued data, to detect the defects and to determine roughness in a reliable way. The development of an operational prototype, able to check small optical components, validates the proposed techniques. The final diagnosis also requires a classification phase. Indeed, if the permanent defects are detected, many “false” defects (dust, cleaning marks. . . ) are emphasized as well. This complex problem is solved by a MLP Artificial Neural Network using an invariant description of the defects. This representation, resulting from the Fourier-Mellin transform, is a high dimensional vector, what implies some problems linked to the “curse of dimensionality”. In order to limit these harmful effects, various dimensionality reduction techniques (Self Organizing Map, Curvilinear Component Analysis and Curvilinear Distance Analysis) are investigated. On one hand we show that CCA and CDA are more powerful than SOM in terms of projection quality. On the other hand, these methods allow using more simple classifiers with equal performances. Finally, a modular neural network, which exploits local models, is developed. We proposed a new classification problems decomposition scheme, based on the intrinsic dimension concept. The obtained data clusters of homogeneous dimensionality have a physical meaning and permit to reduce significantly the training phase of the classifier, while improving its generalization performances
Книги з теми "Contrôle basé sur des règles"
Canada. Commission de contrôle de l'énergie atomique. Politique et règles de procédure sur les mémoires et les interventions à l'adresse de la Commission de contrôle de l'énergie atomique. Ottawa, Ont: Commission de contrôle de l'énergie atomique, 1997.
Знайти повний текст джерелаЧастини книг з теми "Contrôle basé sur des règles"
YAHYAOUI, Khadidja. "Approche hybride pour la navigation autonome des robots mobiles." In Optimisation et apprentissage, 173–209. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9071.ch7.
Повний текст джерелаAHMAD, Bilal, Freeha AZMAT, Armando Walter COLOMBO, and Gerrit Jan VELTINK. "Enseignement et apprentissage des ICPS : leçons apprises et meilleures pratiques." In Digitalisation et contrôle des systèmes industriels cyber-physiques, 335–51. ISTE Group, 2023. http://dx.doi.org/10.51926/iste.9085.ch17.
Повний текст джерелаKHALIL, Ahmad, Nader MBAREK, and Olivier TOGNI. "Optimisation de la consommation énergétique des dispositifs IoT." In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 79–106. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch4.
Повний текст джерелаBONNAIRE, Anne-Coralie. "L’épidémie au prisme des réseaux sociaux numériques." In Les épidémies au prisme des SHS, 35–44. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.5988.
Повний текст джерела