Дисертації з теми "Mesures temps réel"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Mesures temps réel".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Roy, Julien. "Correction et moyennage temps-réel pour mesures interférométriques par peignes de fréquence." Thesis, Université Laval, 2013. http://www.theses.ulaval.ca/2013/30065/30065.pdf.
Kang, Eun-Young. "Abstractions booléennes pour la vérification des systèmes temps-réel." Thesis, Nancy 1, 2007. http://www.theses.fr/2007NAN10089/document.
This thesis provides an efficient formal scheme for the tool-supported real-time system verification by combination of abstraction-based deductive and model checking techniques in order to handle the limitations of the applied verification techniques. This method is based on IAR (Iterative Abstract Refinement) to compute finite state abstractions. Given a transition system and a finite set of predicates, this method determines a finite abstraction, where each state of the abstract state space is a true assignment to the abstraction predicates. A theorem prover can be used to verify that the finite abstract model is a correct abstraction of a given system by checking conformance between an abstract and a concrete model by establishing/proving that a set of verification conditions are obtained during the IAR procedure. Then the safety/liveness properties are checked over the abstract model. If the verification condition holds successfully, IAR terminates its procedure. Otherwise more analysis is applied to identify if the abstract model needs to be more precise by adding extra predicates. As abstraction form, we adopt a class of predicate diagrams and define a variant of predicate diagram PDT (Predicate Diagram for Timed systems) that can be used to verify real-time and parameterized systems
Guiard-Marigny, Thierry. "Modélisation tridimensionnelle des articulateurs de la parole : implémentation temps réel et mesures d'intelligibilité bimodale." Grenoble INPG, 1996. http://www.theses.fr/1996INPG0164.
Limane, Tahar. "Conception et réalisation d'un outil de surveillance, temps réel, d'espaces de débattements de robots." Lyon, INSA, 1991. http://www.theses.fr/1991ISAL0093.
The study presented in this report addresses the problems of designing and implementing a real-time control system of robots movements. The top-Level objective of the study is to enhance the safety of both the human operators and the machines. We begin with a global analysis of risk conditions in Robotics and general relationship statements between the different factors which have to be taken into account when specifying protection systems. We survey the different methods as well as the different equipments used in protection systems against robots possibly undue clearances. Constraints specification of a mean safety system able to control dynamically the robot's containment within the limits allowed or forbidden spaces are studied. Afterwards, we present the functional and structural specifications a well as the conceptual models of the protection systems to be implemented. Methodological approaches of software engineering type are proposed in view of validating the overall system life-cycle, its quality and its reliability. This study results the elaboration of the software tool SAFE (Surveillance d'Ateliers Flexibles et de Leur environnement) which is described in the report. Further developments of SAFE are suggested concerning, particularly, two inter-related functionalities of safety control : - first, the robot command program itself, - second, the dynamic re-specification of safety space when any change arises in the robot's task
Morissette, Jean-François. "Algorithmes de gestion de ressources en temps-réel : positionnement et planification lors d'attaques aériennes." Thesis, Université Laval, 2004. http://www.theses.ulaval.ca/2004/22184/22184.pdf.
Buret, Pierrick. "Sécurité temps réel dans les systèmes embarqués critiques." Thesis, Limoges, 2015. http://www.theses.fr/2015LIMO0140/document.
Satellites are real-time embedded systems and will be used more and more in the world. Become essential for the geo-location, meteorology or communications across the planet, these systems are increasingly in demand. Due to the influx of requests, the designers of these products are designing a more and more complex hardware and software part. Thanks to the evolution of terrestrial equipment, the aero-space field is turning to new technologies such as caches, multi-core, and hypervisor. The integration of these new technologies bring new technical challenges. In effect, it is necessary to improve the performance of these systems by reducing the cost of manufacturing and the production time. One of the major advantages of these technologies is the possibility of reducing the overall number of satellites in space while increasing the number of operators. Multiple clients softwares may be together today in a same satellite. The ability to integrate multiple customers on the same satellite, with the increasing complexity of the system, makes a number of malicious acts possible. These acts were once considered as hypothetical. Become a priority today, the study of the vulnerability of such systems become major. In this paper, we present first work a quick exploration of the field of malicious acts on onboard system and more specifically those carried out on satellite system. Once the risk presentation we will develop some particular points, such as the problematic real-time. In this thesis we are particularly interested in the security of space hypervisors. We will develop precisely 2 lines of research. The first axis is focused on the development of production technics and implementing a control system of a satellite temporal characteristics. The objective is to adapt an existing system to the constraints of the new highly complex systems. We confront the difficulty of measuring the temporal characteristics running on a satellite system. For this we use an optimization method called dynamic analysis and genetic algorithm. Based on trends, it can automatically search for the worst execution time of a given function. The second axis improves the technical knowledge on a satellite in operation and enables decision making in case of malicious act. We propose specifically a physical solution to detect anomalies in the management of internal memory to the satellite. Indeed, memory is an essential component of system operation, and these common properties between all clients makes them particularly vulnerable to malicious acts. Also, know the number of memory access enables better scheduling and better predictability of a real time system. Our component allows the detection and interpretation of a potential attack or dependability problem. The work put in evidence the complementarity of the two proposed work. Indeed, the measure of the number of memory access that can be measured via a genetic algorithm whose shape is similar to the program seeking the worst execution time. So we can expand our work of the first part with the second
Testa, Mauro. "Mesures physiques pour la vérification du parcours des ions en hadronthérapie." Phd thesis, Université Claude Bernard - Lyon I, 2010. http://tel.archives-ouvertes.fr/tel-00556628.
Hautot, Félix. "Cartographie topographique et radiologique 3D en temps réel : acquisition, traitement, fusion des données et gestion des incertitudes." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS141.
In the field of nuclear related activities such as maintenance, decontamination and dismantling status reports of potentially contaminated or activated elements are required beforehand. For economic reasons, this status report must be quickly performed. So as to be done quickly, the operation is realized by an operator, and his exposure time must be reduced as much as possible. Concerning indoor environments, it can be hard to make such investigations due to out-of-date plans or maps, loose of GPS signal, pre-positioning of underlying or precalibrated systems. Indeed, the premises status report is obtained by coupling nuclear measurements and topographical mapping. In such kind of situation it is necessary to have a portative instrument that delivers an exhaustive radiological and topographical mapping in order to deliver a decision support concerning the best intervention scenario to set up as fast as possible. Furthermore, and so as to reduce operator’s exposure time, such kind of method must be usable in real time. This method enables to proceed to complex intervention within the best radiological previsions for optimizing operator’s exposition time and waste management. In this goal, Areva STMI then developed a nuclear measurement probes autonomous positioning and motion estimation system based on visual SLAM (Simultaneous Localization And Mapping). These developments led to apply a patent. This thesis consisted in pursuing this survey, especially decomposing all the underlying systems, continuing the data fusion developments, proposing optimisations, and setting the basis of a real-time associated uncertainties analysis. SLAM based on visual odometry can be performed with RGB-D sensor (Microsoft Kinect®-like sensors). The acquisition process delivers a 3D map containing radiological sensors poses (positions and orientations in 3D) and measurements (dose rate and CZT gamma spectrometry) without any external signal or device. Moreover, a few radioactive sources localization algorithms based on geostatistics and back projection of measurements can also be performed in near real-time. It is then possible to evaluate the position of radioactive sources in the scene and compute fast radiological mappings of premises close to the acquisition. The last part of this work consisted in developing an original method for real-time evaluation of the process chain and results accuracies. The evaluation of uncertainties and their propagation along the acquisition and process chain in real-time provide feedbacks on employed methods for investigations or intervention processes and enable to evaluate the reliability of acquired data. Finally, a set of benchmarks has been performed in order to estimate the results quality by comparing them to reference methods
Maxim, Cristian. "Étude probabiliste des contraintes de bout en bout dans les systèmes temps réel." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066479/document.
In our times, we are surrounded by technologies meant to improve our lives, to assure its security, or programmed to realize different functions and to respect a series of constraints. We consider them as embedded systems or often as parts of cyber-physical systems. An embedded system is a microprocessor-based system that is built to control a function or a range of functions and is not designed to be programmed by the end user in the same way that a PC is. The Worst Case Execution Time (WCET) of a task represents the maximum time it can take to be executed. The WCET is obtained after analysis and most of the time it cannot be accurately determined by exhausting all the possible executions. This is why, in industry, the measurements are done only on a subset of possible scenarios (the one that would generate the highest execution times) and an execution time bound is estimated by adding a safety margin to the greatest observed time. Amongst all branches of real-time systems, an important role is played by the Critical Real-Time Embedded Systems (CRTES) domain. CRTESs are widely being used in fields like automotive, avionics, railway, health-care, etc. The performance of CRTESs is analyzed not only from the point of view of their correctness, but also from the perspective of time. In the avionics industry such systems have to undergo a strict process of analysis in order to fulfill a series of certification criteria demanded by the certifications authorities, being the European Aviation Safety Agency (EASA) in Europe or the Federal Aviation Administration (FAA) in United States. The avionics industry in particular and the real-time domain in general are known for being conservative and adapting to new technologies only when it becomes inevitable. For the avionics industry this is motivated by the high cost that any change in the existing functional systems would bring. Any change in the software or hardware has to undergo another certification process which cost the manufacturer money, time and resources. Despite their conservative tendency, the airplane producers cannot stay inactive to the constant change in technology and ignore the performance benefices brought by COTS processors which nowadays are mainly multi-processors. As a curiosity, most of the microprocessors found in airplanes flying actually in the world, have a smaller computation power than a modern home PC. Their chips-sets are specifically designed for embedded applications characterized by low power consumption, predictability and many I/O peripherals. In the actual context, where critical real-time systems are invaded by multi-core platforms, the WCET analysis using deterministic approaches becomes difficult, if not impossible. The time constraints of real-time systems need to be verified in the context of certification. This verification, done during the entire development cycle, must take into account architectures more and more complex. These architectures increase the cost and complexity of actual, deterministic, tools to identify all possible time constrains and dependencies that can occur inside the system, risking to overlook extreme cases. An alternative to these problems is the probabilistic approach, which is more adapted to deal with these hazards and uncertainty and which allows a precise modeling of the system. 2. Contributions. The contribution of the thesis is three folded containing the conditions necessary for using the theory of extremes on executions time measurements, the methods developed using the theory of extremes for analyzing real-time systems and experimental results. 2.1. Conditions for use of EVT in the real-time domain. In this chapter we establish the environment in which our work is done. The use of EVT in any domain comes with a series of restrictions for the data being analyzed. In our case the data being analyzed consists in execution time measurements
Maxim, Cristian. "Étude probabiliste des contraintes de bout en bout dans les systèmes temps réel." Electronic Thesis or Diss., Paris 6, 2017. http://www.theses.fr/2017PA066479.
In our times, we are surrounded by technologies meant to improve our lives, to assure its security, or programmed to realize different functions and to respect a series of constraints. We consider them as embedded systems or often as parts of cyber-physical systems. An embedded system is a microprocessor-based system that is built to control a function or a range of functions and is not designed to be programmed by the end user in the same way that a PC is. The Worst Case Execution Time (WCET) of a task represents the maximum time it can take to be executed. The WCET is obtained after analysis and most of the time it cannot be accurately determined by exhausting all the possible executions. This is why, in industry, the measurements are done only on a subset of possible scenarios (the one that would generate the highest execution times) and an execution time bound is estimated by adding a safety margin to the greatest observed time. Amongst all branches of real-time systems, an important role is played by the Critical Real-Time Embedded Systems (CRTES) domain. CRTESs are widely being used in fields like automotive, avionics, railway, health-care, etc. The performance of CRTESs is analyzed not only from the point of view of their correctness, but also from the perspective of time. In the avionics industry such systems have to undergo a strict process of analysis in order to fulfill a series of certification criteria demanded by the certifications authorities, being the European Aviation Safety Agency (EASA) in Europe or the Federal Aviation Administration (FAA) in United States. The avionics industry in particular and the real-time domain in general are known for being conservative and adapting to new technologies only when it becomes inevitable. For the avionics industry this is motivated by the high cost that any change in the existing functional systems would bring. Any change in the software or hardware has to undergo another certification process which cost the manufacturer money, time and resources. Despite their conservative tendency, the airplane producers cannot stay inactive to the constant change in technology and ignore the performance benefices brought by COTS processors which nowadays are mainly multi-processors. As a curiosity, most of the microprocessors found in airplanes flying actually in the world, have a smaller computation power than a modern home PC. Their chips-sets are specifically designed for embedded applications characterized by low power consumption, predictability and many I/O peripherals. In the actual context, where critical real-time systems are invaded by multi-core platforms, the WCET analysis using deterministic approaches becomes difficult, if not impossible. The time constraints of real-time systems need to be verified in the context of certification. This verification, done during the entire development cycle, must take into account architectures more and more complex. These architectures increase the cost and complexity of actual, deterministic, tools to identify all possible time constrains and dependencies that can occur inside the system, risking to overlook extreme cases. An alternative to these problems is the probabilistic approach, which is more adapted to deal with these hazards and uncertainty and which allows a precise modeling of the system. 2. Contributions. The contribution of the thesis is three folded containing the conditions necessary for using the theory of extremes on executions time measurements, the methods developed using the theory of extremes for analyzing real-time systems and experimental results. 2.1. Conditions for use of EVT in the real-time domain. In this chapter we establish the environment in which our work is done. The use of EVT in any domain comes with a series of restrictions for the data being analyzed. In our case the data being analyzed consists in execution time measurements
Nham, Toan. "Suivi in vivo et en temps réel du processus infectieux induit par Yersinia pestis." Phd thesis, Université Paris-Diderot - Paris VII, 2012. http://tel.archives-ouvertes.fr/tel-00731170.
Cornille, Clara. "Incorporation du bismuth dans GaAs : compréhension et maîtrise par couplage de mesures en temps réel de courbure et diffraction électronique." Thesis, Toulouse 3, 2019. http://www.theses.fr/2019TOU30331.
Research has been needed in large infrared devices, especially around 1.3µm in GaAs field. GaAsBi and derived alloys offer a large band structure engineering, make them a good candidate for 1eV solar cells, 1.3µm photocathodes or thermoelectric materials and spintronic.Though, the epitaxy of those III-V alloys is a challenge. In fact, they have a high lattice mismatch and bismuth incorporation is proved highly dependant of the growth conditions. First, we will present the context of our study : we will detail their required properties for applications, and place ourseves amoung literature. We will also describe the exploited techniques. Precise growth parameters can be selected by molecular beam epitaxy and they determine the structual characteristics of our material. We also have an original technique of real time coupling curvature measurement exploited with synchronized electronic diffraction. Bismuth incorporation study was made with those informations, obtained by varying growth conditions. Ex-situ techniques as X-Rays diffraction, Raman spectroscopy, Hall effect and Transmission Electronic Microscopy were also used to confort our original results. Then, we explained the different experimental studies we made on growth and caracterisation of those alloys. We pointed out a change in surface reconstruction during the growth, from the (1x3) reconstruction to the (2x1). We started to study the bismuth incorporation for the 2 surface reconstructions during growth, varying growth conditions : substrate temperature and elements fluxes. We exhibit a higher incorporation with the (1x3) reconstruction, and increasing for higher V/III flux ratio. Those conditions gave us growing GaAsBi layers with 2 different bismuth concentration. Then, we demonstrated the thermal activation of surface reconstruction transition, with the apparition of a surface stress, increasing with V/III ratios. Thirdly, we also validate our results on bismuth content by comparing their values with X ray diffraction. We applied this technique to elaborate (Ga)AlAsBi layers. We proved that optimize growth conditions are different from those found for GaAsBi. We obtained content layers up to 3% of aluminium. Thanks to his work, we obtained a comprehensive knowledge of bismuth incorporation in GaAs, and we developed it to consider further perspective for GaAsBi
Soury, Ayoub. "Approches de sûreté de fonctionnement sur Ethernet temps réel : application à une nouvelle génération d’ascenseur." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAT029/document.
The design of a communication network with a real-time Ethernet-based security that meets the requirements of the PESSRAL standard, derived from IEC 61508, is the basis of our work. In order to achieve this goal, we implement mechanisms reducing the residual error probability and achieving Safety Integrity Levels (SIL) via a deterministic electronic system. Through a single communication channel, our system must be able to integrate critical and non-critical functions without compromising the system certification.According to this commitment, we suggest an industrial communication system based on real-time Ethernet. The proposed communication interfaces meet the requirements of responsiveness and determinism in order to guarantee the temporal constraints imposed by the process and the standard. To ensure the functional safety of the interfaces, we have proposed a "safety" overlay that implements security functions according to the concept of the black channel defined in IEC 61508. Based on these properties, we have managed to classify the Ethernet-based real-time solutions into three classes in terms of cycle time. The overlay "safety", based on the redundancy of data, made it possible to give up the solution of physical redundancy. This data redundancy duplicates the initial cycle time of the network, which nonetheless satisfies the security and time conditions of the standard
Taleb, Miassa. "Exploitation des mesures électriques en vue de la surveillance et du diagnostic en temps réel des piles à combustible pour application transport automobile." Thesis, Université Paris-Saclay (ComUE), 2015. http://www.theses.fr/2015SACLC010/document.
In the current global energy context, proton exchange membrane fuel cells represent a promising solution to the future development of a new generation of electrified vehicles, allowing greater autonomy than electrified vehicles using batteries.Nevertheless, the large-scale development of fuel cells remains limited due to some technological locks, such as water management. To enable mass production of fuel cells, such problems must be solved. Several working axes may be envisaged both on the hardware aspects of the fuel cell structure, and from the point of view of control, by developing algorithmic tools for monitoring the operating state of the system to detect any failures, or degradations that may occur.The work of this thesis falls within this second approach and focuses specifically on the identification of drying and drowning phenomena which can appear in a fuel cell, to diagnose any moisture problems leading to yield reduction.The methods developed in this work are based on the monitoring of relevant parameters of the fuel cell model which changes, compared to reference values, are characteristic of the state of the fuel cell hydration.The real-time monitoring of these parameters can highlight the drying and drowning phenomena.Adopted models for this work are based on a representation of the electrical impedance of the fuel cell.Thus, following this approach, the adopted strategy is then based on the development of two electrical models: an integer order model and a fractional order model. It appears that the second model formulation is closer to the physical reality of transport phenomena occurring in the fuel cell. It allows a better representation of the fuel cell behavior in time and frequency domain. Indeed, the analyzes based on experimental results performed using a single fuel cell (100 cm2 active area designed by UBzM company) have validated that the fractional order model, in return for an increase of complexity, allows better reproduce, in the one hand of the fuel cell time-series voltage response (voltage monitoring for a given current profile), on the other hand a better approximation of the measured impedance. Conventional and of fractional order parametric identification methods are then used to extract the model’s parameters from time-series experimental data (voltage / current from the battery) or frequency data (impedance spectroscopy).A sensitivity analysis allows then the defining of the most indicative parameters of the drowning and drying phenomena. The evolution of these parameters associated with the voltage and impedance spectrum of the fuel cell are then combined to build a diagnosis strategy of the fuel cell water management
Thierry, Philippe. "Systèmes véhiculaires à domaines de sécurité et de criticité multiples : une passerelle systronique temps réel." Thesis, Paris Est, 2014. http://www.theses.fr/2014PEST1102/document.
Nowadays, vehicular systems are composed of more and more interconnected systems. Those systems manage a lot of complex functions and must comply with various safety-critical requirements (such as real-time) but also more and more with security requirements. With the new connected vehicles, it is necessary to make these various systems communicate, in order to manage locally or remotely the overall vetronic system. Make these systems communicate, moreover in military vehicles, implies to support various constraints. Theses constraints need to be supported by specific elements, used as gateways between each vehicle system needing external communication. This gateway has to protect each system in term of safety and security, but also has to guarantee an efficient upper-bounded transfer between them. In this thesis, we have proposed a software architecture for these gateways, compliant with the various vehicular security and safety requirements. The solution is proposed as a framework, supporting a modular configuration and able to aggregate various modules on a partitioned software architecture. Such an aggregation is then able to respond to the various vehicular specific needs such as security and real-time
Fontan, Benjamin. "Méthodologie de conception de systèmes temps réel et distribués en contexte UML/SysML." Phd thesis, Université Paul Sabatier - Toulouse III, 2008. http://tel.archives-ouvertes.fr/tel-00258430.
Krasnowski, Piotr. "Codage conjoint source-chiffrement-canal pour les canaux de communication vocaux sécurisés en temps réel." Thesis, Université Côte d'Azur, 2021. http://www.theses.fr/2021COAZ4029.
The growing risk of privacy violation and espionage associated with the rapid spread of mobile communications renewed interest in the original concept of sending encrypted voice as audio signal over arbitrary voice channels. The usual methods used for encrypted data transmission over analog telephony turned out to be inadequate for modern vocal links (cellular networks, VoIP) equipped with voice compression, voice activity detection, and adaptive noise suppression algorithms. The limited available bandwidth, nonlinear channel distortion, and signal fadings motivate the investigation of a dedicated, joint approach for speech encodingand encryption adapted to modern noisy voice channels.This thesis aims to develop, analyze, and validate secure and efficient schemes for real-time speech encryption and transmission via modern voice channels. In addition to speech encryption, this study covers the security and operational aspects of the whole voice communication system, as this is relevant from an industrial perspective.The thesis introduces a joint speech encryption scheme with lossy encoding, which randomly scrambles the vocal parameters of some speech representation (loudness, pitch, timbre) and outputs an encrypted pseudo-voice signal robust against channel noise. The enciphering technique is based on random translations and random rotations using lattices and spherical codes on flat tori. Against transmission errors, the scheme decrypts the vocal parameters approximately and reconstructs a perceptually analogous speech signal with the help of a trained neural-based voice synthesizer. The experimental setup was validated by sending encrypted pseudo-voice over a real voice channel, and the decrypted speech was tested using subjective quality assessment by a group of about 40 participants.Furthermore, the thesis describes a new technique for sending data over voice channels that relies on short harmonic waveforms representing quaternary codewords. This technique achieves a variable bitrate up to 6.4 kbps and has been successfully tested over various real voice channels. Finally, the work considers a dedicated cryptographic key exchange protocol over voice channels authenticated by signatures and a vocal verification. The protocol security has been verified in a symbolic model using Tamarin Prover.The study concludes that secure voice communication over real digital voice channels is technically viable when the voice channels used for communication are stable and introduce distortion in a predictable manner.stabintroduce distortion in a predictable manner
Jahanpour, Emilie. "Développement et mise en œuvre d’une approche psycho-physio-acoustique pour le contrôle temps réel de l’impact du bruit en cabine d’hélicoptère." Thesis, Toulouse, ISAE, 2019. http://www.theses.fr/2019ESAE0045.
Environmental noise has well-known effects on humans. In the short term, it can be a source of stress, fatigue, or decreased alertness. However, the literature shows complex effects, it can, for example, be a source of pleasure and motivation. In the field of helicopter acoustics, cabin noise is particular because it has a wide frequency range (10-10000Hz). The noise of the main transmission gearbox is particularly unpleasant because it is tonal noise in frequency ranges (500-3000 Hz) close to speech (200-6000 Hz) to which humans are very sensitive. Passengers want to be able to work, read and rest without being annoyed, so one challenge for manufacturers is to improve sound comfort in the cabin. To reduce this noise, one solution is to use active noise control. Airbus Helicopters has developed a headrest system integrating speakers and microphones to generate an area around the passenger's head in which active noise control is performed. The addition of a multi-tone algorithm, designed to filter only emerging tones, allows a gain up to 4 dB(A), which represents a 15% reduction in discomfort. The purpose of this thesis was to define whether it is relevant to filter all these tones according to the passenger's current activity. In other words, this thesis aimed to better understand the impact of different helicopter cabin noises on cognitive performance and passenger comfort through subjective, behavioural (performance, oculometry) and psychophysiological (electroencephalography, electrocardiography) measurements. In order to simulate a passenger's activity, three tasks were selected: a "working" task (combining mental calculation, reasoning, and working memory), a reading task and finally a resting task. The results were compared with those obtained by the acoustic comfort scale developed by Airbus Helicopters. We find a good correspondence between this scale and our results. In addition, our behavioural and psychophysiological results show that, generally short exposure to helicopter noises has limited deleterious effects on task performance and creates only a slight increase in stress level, observable through the cerebral and cardiac activity. However, the subjective feeling is most impacted by noise, with a negative feeling associated to the noises with the most tones
Augé, Bruno. "Modélisation, étude, réalisation d'un interféromètre in-situ, temps réel destiné aux mesures dimensionnelles des puces électroniques submicroniques pendant un procédé de gravure ou de dépot." Metz, 1997. http://docnum.univ-lorraine.fr/public/UPV-M/Theses/1997/Auge.Bruno.SMZ9728.pdf.
Permanent progress in the semiconductor industry is essentially linked to a continous rise in integration capacity, to smaller circuit dimensions and larger silicon wafer diameters. In order to remain competitive, the performance of submicron device manufacturing lines employing complex process which are difficult to master has to be optimised. It is understandable under these conditions that in-situ and real time control of circuit thickness during the etch or deposition operation gives a serious advantage over competitors. Among the optical in-situ non intrusive and non destructive methods, spectroscopic interferometry at normal incidence allows the measurement of the thickness of layers present on the silicon wafer during manufacturing. This study has been performed in two parts : the measurement principle and manufacturing control. For the measurement principle, the optical properties of multi-layer system have been studied using the Abeles formalism. For the manufacturing control, we conceived and built an instrument allowing to position the interferometric head relativity limited measurement sites located on the silicon wafer. To do this, the site has to be recognized and the camera be positioned with a precision adapted to the site dimensions. An imaging module including in particular a pattern recognition routine and the steering of a motorized xy table, have been studied and integrated into the unit of layer thickness calculation
Moyal, Pascal. "Contributions à l'étude des files d'attente avec clients impatients." Phd thesis, Télécom ParisTech, 2005. http://pastel.archives-ouvertes.fr/pastel-00001340.
Offermann, Alexis. "Conception et validation d’un robot apte à effectuer des mesures sur ouvrage d’art." Thesis, Compiègne, 2021. http://www.theses.fr/2021COMP2603.
This PhD. applies in the field of robotics for building inspection. Buildings are understood here as huge constructions such as bridges or churches. Using photogrammetry to analyses the structure of these kind of buildings is nowadays a common technique. To extend the analysis methodologies, we propose in this document to imagine a way to bring tools directly in contact with the buildings. Multiple solution possibilities are presented for a final choice. The chosen solution consists of designing a drone able to tilt its arms to bring the building inspection tool directly onto the wall of the construction. This leads to a double challenge. Firstly, the mechanical part of designing such a complex and non-common drone. Secondly,the development and real time testing of the control algorithm. Eventually, this manuscript proposes to use a particular software architecture joining fast experimentations and validation of the control laws. This platform being very versatile, it is also possible to consider re-using it for different applications in future works. The experimentations reveal good results, promoting the usage of the drone as a carrying vector to bring the tools onto the construction
Palisse, Aurélien. "Analyse et détection de logiciels de rançon." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S003/document.
This phD thesis takes a look at ransomware, presents an autonomous malware analysis platform and proposes countermeasures against these types of attacks. Our countermeasures are real-time and are deployed on a machine (i.e., end-hosts). In 2013, the ransomware become a hot subject of discussion again, before becoming one of the biggest cyberthreats beginning of 2015. A detailed state of the art for existing countermeasures is included in this thesis. This state of the art will help evaluate the contribution of this thesis in regards to the existing current publications. We will also present an autonomous malware analysis platform composed of bare-metal machines. Our aim is to avoid altering the behaviour of analysed samples. A first countermeasure based on the use of a cryptographic library is proposed, however it can easily be bypassed. It is why we propose a second generic and agnostic countermeasure. This time, compromission indicators are used to analyse the behaviour of process on the file system. We explain how we configured this countermeasure in an empiric way to make it useable and effective. One of the challenge of this thesis is to collate performance, detection rate and a small amount of false positive. To finish, results from a user experience are presented. This experience analyses the user's behaviour when faced with a threat. In the final part, I propose ways to enhance our contributions but also other avenues that could be explored
Terroir, Jonathan. "Mesures, modélisation et synthèse des transitions entre notes et des sources de bruit dans les instruments à anche simple." Phd thesis, Aix-Marseille 2, 2006. http://theses.univ-amu.fr.lama.univ-amu.fr/2006AIX22087.pdf.
Vnuk, Edouard. "Développement d'outils d'analyse de fluorescence appliqués au génotypage sur puce à ADN : de l'acquisition à l'analyse d'images, mesures de cinétique d'hybridation en temps réel basées sur le transfert d'énergie." Ecully, Ecole centrale de Lyon, 2005. http://bibli.ec-lyon.fr/exl-doc/evnuk.pdf.
The scope of this work was to improve the reliability of DNA microarrays without to increase the number of measurement repetitions. A software, allowing to analyze signals of fluorescence and set up a general strategy of conception of DNA microarrays, was developed from physical considerations about fluorescence at the surface of microarrays. Its implementation was completed by a software providing a link between the various tools of our laboratory. In order to further understand the phenomena of hybridization at solid/liquid interface, we have developed a methodology aimed at detecting hybridization on microarrays using Fluorescence Resonance Energy Transfer (FRET). The results showed that we can be : measured and analysed kinetics of specific hybridization, given information on the local relative density of probes imobilized and on hybridization yield, controlled the quality for individual spots
Bel, Hadj Aissa Nadia. "Maîtrise du temps d'exécution de logiciels déployés dans des dispositifs personnels de confiance." Thesis, Lille 1, 2008. http://www.theses.fr/2008LIL10133/document.
The proliferation of small and open objects such as personal trusted devices has encouraged the spread of dynamically adaptable runtime environments. Thus, new software can be deployed on the fly after the devices are delivered to their holders. Through our work, we aim to ensure that each new software, whose deployment is successful, will be able to deliver responses within a maximum delay previously established. These guarantees are crucial in terms of safety and security. To this end, we propose to distribute the computation of worst case execution time. Our solution embraces a proof carrying code approach making distinction between a powerful but untrusted computer used to produce the code, and a safe but resource constrained code consumer. The producer does not assume any prior knowledge of the runtime environment on which its software will be executed. The code is statically analyzed to extract loop bounds and a proof containing this information is joint to the software. By a straightforward inspection of the code, the consumer can verify the validity of the proof and compute the global worst case execution time. We experimentally validate our approach on a hardware and software architecture which meets the requirements of trusted personal devices. Finally, we address the challenges raised when software from different service providers potentially untrusted can coexist and interact in a single device. We focus on the impact of the interaction between different software units on the guarantees previously given by the system on the worst case execution time and we outline a solution based on contracts to maintain these guarantees
Bekkouche, Réda. "Contribution à la conception sure de systèmes complexes, critiques et distribués." Toulouse 3, 2003. http://www.theses.fr/2003TOU30172.
Andrieu, H. "Interprétation de mesures du radar Rodin de Trappes pour la connaissance en temps réel des précipitations en Seine-Saint-Denis et Val-de-Marne : intérêt pour la gestion automatisée d'un réseau d'assainissement." Phd thesis, Ecole Nationale des Ponts et Chaussées, 1986. http://tel.archives-ouvertes.fr/tel-00462327.
Zbrzeski, Adeline. "Circuits intégrés d’enregistrement et d’analyse en temps réel des potentiels de champ neuronaux : application au traitement de la maladie de Parkinson, par contrôle adaptatif de stimulations cérébrales profondes." Thesis, Bordeaux 1, 2011. http://www.theses.fr/2011BOR14328/document.
Parkinson’s disease is the second most common neurodegenerative diseases throughout theworld. In this context, the research project associated with this thesis is to improve the symptomatictreatment of Parkinson’s disease through the development process of deep brain stimulationadaptive. The work of this thesis is based on the design of an ASIC for recording andprocessing of neural signals, in response to a variety of issues : ongoing treatment and real-timefocus on specific bands of very low-frequency and highly configurable. The goal is to use theprocessed information to the control and generation of a stimulation signal. This ASIC wasdeveloped, characterized and used electronically in a context in vivo. A closed-loop system wasmade from the ASIC, showing functional. These in vivo validations open up many possibilitiesfor investigation of the concept of closed-loop brain stimulation
Pascual, Nathalie. "Horloges de synchronisation pour systèmes haute sécurité." Montpellier 2, 1992. http://www.theses.fr/1992MON20145.
De, Sousa Marie-Carmen. "Contribution à l'optimisation de la radioprotection du patient en radiologie : de la mesure en temps réel de la dose en radiologie conventionnelle au calcul du risque de vie entière de décès par cancer radio-induit spécifique par sexe et par âge." Toulouse 3, 2002. http://www.theses.fr/2002TOU30003.
Javed, Ibrahim Tariq. "A trust framework for real-time web communications." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0016.
Real-time web conversational services allow users to have audio and video calls over the Internet. Over-The-Top operators such as Google and Facebook offer cost-effective communication services with advanced conversational features. With the introduction of WebRTC standard, any website or web application can now have built-in communication capabilities. WebRTC technology is expected to boost Voice-Over-IP by making it more robust, flexible and accessible. Telco operators also intend to use the underlying technology to offer communication services to their subscribers over the web. Emerging web-centric communication platforms aims to offer modern methods of contacting and communicating over the web. However, web operators are unable to ensure the trustworthiness of their subscribers, since identities are based on self-asserted user profiles and credentials. Thus, they remain exposed to many social threats in which the context between communicating parties is manipulated. An attacker usually misrepresents himself to convey false information to the targeted victim. Typical social threats include phishing, spam, fraudulent telemarketing and unlawful content distribution. To ensure user security over communication networks, trust between communicating parties needs to be established. Communicating participants should be able to verify each other’s identity to be sure of whom they are talking to. However, authentication alone cannot guarantee the trustworthiness of a caller. New methods of estimating caller’s reputation should also be built in web calling services. In this thesis, we present a novel trust framework that provides information about the trustworthiness of callers in web communication networks. Our approach is organized in four parts. Firstly, we describe the notion of trust in real-time web communication services. A trust model approach is presented to formally introduce the trust computation parameters and relationships in a communication system. Secondly, we detail the mechanism of identity provisioning that allows communicating participants to verify each other’s identity in a Peer-to-Peer fashion. The choice of authentication protocol highly impacts user privacy. We showed how OpenID Connect used for Single-Sign-On authentication purposes can be effectively used for provisioning identities while preserving user privacy. Thirdly, a trust computational model is proposed to measure the trustworthiness of callers in a communication network. The legitimacy and genuineness of a caller’s identity is computed using recommendations from members of the network. On the other hand, the popularity of a caller is estimated by analyzing its behavior in the network. Each subscriber will be able to visualize the computed trust of other members before initiating or accepting a call request. Lastly, the reputation of a caller is used to combat nuisance calls generated over communication networks. Nuisance calls are described as unsolicited bulk spam phone calls generated for marketing and deceptive purposes. Caller’s reputation is computed using the diversity of outgoing calls, call duration, recommendations from called participants, reciprocity and repetitive nature of calls. The reputation is used to differentiate between legitimate and nuisance calls generated over the network
Semghouni, Samy Rostom. "Modélisation stochastique des transactions temps réel." Le Havre, 2007. http://www.theses.fr/2007LEHA0012.
Real-time database systems (RTDBSs) are systems designed to address the applications which need real-time processing of large quantities of data. An RTDBS must guarantee the transactions ACID (Atomicity, Consistency, Isolation, Durability) properties on one hand, and must schedule the transactions in order to meet their individual deadlines, on the other hand. In this thesis, we focus on stochastic and probabilistic study of the behavior of real-time transactions. The study is conducted under some assumptions such as the arrival mean of transactions, transactions type, concurrency control protocol (an optimistic and a pessimistic), and scheduling policy. We have then designed and developed a flexible and extensible RTDBS simulator, on which the study is done. The obtained results have shown that the transactions behavior can be approximated by a probabilistic model. The model is used to predict the transactions success ratio according to the system workload. We also propose a new scheduling policy for real-time transactions which uses criteria based on both transaction deadlines and transaction importance. This policy contributes to enhance the system performances (maximization of committing transactions), improving then the RTDBSs quality of service
Rivero, Daniel. "Mesure en temps réel de position à précision subpixel dans une image." Dijon, 1999. http://www.theses.fr/1999DIJOS006.
Carvalho, Fred Calim. "Hydrocalc : calculateur temps réel de la lame d'eau par radar." Paris 11, 1986. http://www.theses.fr/1986PA112281.
Javed, Ibrahim Tariq. "A trust framework for real-time web communications." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0016/document.
Real-time web conversational services allow users to have audio and video calls over the Internet. Over-The-Top operators such as Google and Facebook offer cost-effective communication services with advanced conversational features. With the introduction of WebRTC standard, any website or web application can now have built-in communication capabilities. WebRTC technology is expected to boost Voice-Over-IP by making it more robust, flexible and accessible. Telco operators also intend to use the underlying technology to offer communication services to their subscribers over the web. Emerging web-centric communication platforms aims to offer modern methods of contacting and communicating over the web. However, web operators are unable to ensure the trustworthiness of their subscribers, since identities are based on self-asserted user profiles and credentials. Thus, they remain exposed to many social threats in which the context between communicating parties is manipulated. An attacker usually misrepresents himself to convey false information to the targeted victim. Typical social threats include phishing, spam, fraudulent telemarketing and unlawful content distribution. To ensure user security over communication networks, trust between communicating parties needs to be established. Communicating participants should be able to verify each other’s identity to be sure of whom they are talking to. However, authentication alone cannot guarantee the trustworthiness of a caller. New methods of estimating caller’s reputation should also be built in web calling services. In this thesis, we present a novel trust framework that provides information about the trustworthiness of callers in web communication networks. Our approach is organized in four parts. Firstly, we describe the notion of trust in real-time web communication services. A trust model approach is presented to formally introduce the trust computation parameters and relationships in a communication system. Secondly, we detail the mechanism of identity provisioning that allows communicating participants to verify each other’s identity in a Peer-to-Peer fashion. The choice of authentication protocol highly impacts user privacy. We showed how OpenID Connect used for Single-Sign-On authentication purposes can be effectively used for provisioning identities while preserving user privacy. Thirdly, a trust computational model is proposed to measure the trustworthiness of callers in a communication network. The legitimacy and genuineness of a caller’s identity is computed using recommendations from members of the network. On the other hand, the popularity of a caller is estimated by analyzing its behavior in the network. Each subscriber will be able to visualize the computed trust of other members before initiating or accepting a call request. Lastly, the reputation of a caller is used to combat nuisance calls generated over communication networks. Nuisance calls are described as unsolicited bulk spam phone calls generated for marketing and deceptive purposes. Caller’s reputation is computed using the diversity of outgoing calls, call duration, recommendations from called participants, reciprocity and repetitive nature of calls. The reputation is used to differentiate between legitimate and nuisance calls generated over the network
Lemerre, Matthieu. "Intégration de systèmes hétérogènes en termes de niveaux de sécurité." Phd thesis, Université Paris Sud - Paris XI, 2009. http://tel.archives-ouvertes.fr/tel-00440329.
Traore, Karim. "Analyse et validation des applications temps réel en présence de transactions : application au pilotage d'un drone miniature." Poitiers, 2007. http://www.theses.fr/2007POIT2261.
We present a concrete case study of an embedded system and its implications in the theory of real-time scheduling. The development process of the embedded system controlling an unmanned aerial vehicle (UAV) pointed out some limitations in the classic modelling of concrete real-time systems because some hardware devices lead to a specific activation scheme of the tasks (e. G. Serial communication between active sensors and the processor). We had to define a new task model in order to take this particular scheme, which occurs frequently in real applications (aircraft and automotive systems). This is the model of serial transactions that we generalize to monotonic transactions. We present the case study of the UAV, and the aspects of real-time scheduling theory related to the monotonic and serial transactions (comparison with the transactions and the multiframe model). We give an exact characterization of the worst case response time in a pseudo-polynomial time for our model
Abecasis, Donna. "Bases neurophysiologiques du traitement des séquences sonores en temps réel : étude des accents métriques." Paris 5, 2006. http://www.theses.fr/2006PA05H041.
Within the area of rhythm perception, the present work vas aimed at exploring in real time (using event-related brain potentials, ERPs) the induction of meter. Even in perfectly regular sound sequences and in the absence of physical differences between the tones (isochronous equitone sequences) we tend to perceive “subjective” metrical accenting (strong and weak beats), associated with the generation of temporal expectancies. We introduced occasional violations of expectancies (deviant soft tones) in otherwise equitone sequences. A late, artention-dependent ERP component (P3) showed larger amplitudes in response to deviants in accented positions. In further studies, earlier. Left-lateralised metrical effects on the elicited brain responses were also found, both in standard and deviant tones. Our results, discussed in the light of theories of attention, suggest that “subjective” accenting follows a default binary pattem, possibly due to covert schemes spontaneouslv imposed by listeners
Ghazaly, Christelle. "Développement d’un capteur spectrophotométrique pour la mesure en temps réel des expositions professionnelles à l’ozone." Electronic Thesis or Diss., Université de Lorraine, 2019. http://www.theses.fr/2019LORR0207.
Ozone causes headaches, eye burns and lung damage and serious respiratory diseases such as asthma. Ozone is emitted into the atmosphere of workplaces in various sectors, including printing, water treatment, arc welding, and plastics processing. Exposure of workers to concentrations exceeding national and european ozone occupational exposure limit values (OELs), set at 100 ppbv over 8 hours and 200 ppbv over 15 minutes, may cause severe health alterations. Currently, the determination of ozone concentrations is carried out by using colorimetric tubes, providing spot measurements, or by using commercial sensors. Some studies were carried out on electrochemical cells or semiconductors based sensors and more rarely on optical sensors. The detection limit of these sensors is compatible with ozone OELs, but they are fragile and not selective. There is currently no reliable and robust reference method for the assessment of occupational exposures to ozone. The objective of this study is the development of a real-time ozone measurement method, which is characterized by a stable signal under air, high sensitivity, and selectivity. This measurement system must also make it possible to identify the most exposed phases for employees. We chose visible spectroscopy as a simple, fast and accurate detection system. We have successfully developed the sensitive material, based on an inexpensive dye, methylene blue, adsorbed on a thin film of mesoporous silica deposited on a glass plate by dip-coating. This material is stable for more than 50 days stored under ambient air. The system also includes a Nafion® tube; used to stabilize the relative humidity of the air. The measured sensor signal is the absorbance decrease at 600 nm. This reduction results from the oxidation of the dye in the presence of ozone and is irreversible under air. The developed sensor is characterized by sensitivity to low ozone concentrations ranging from 10 to 500 ppbv, reproducible response kinetics and no direct interference in the presence of 500 ppbv of nitrogen dioxide. The temperature dependence of the sensor response is described. The performance of the detection during exposure scenarios for short times and variable concentrations is described. The developed system could be a good candidate for real-time monitoring of occupational ozone exposures. This step will require miniaturization of the test bench components to use the sensor developed in the workplace
Cardin-Bernier, Guillaume. "Observateur pour le suivi en temps réel de cultures cellulaires végétales." Mémoire, Université de Sherbrooke, 2011. http://savoirs.usherbrooke.ca/handle/11143/1591.
Idrissi, Azzouzi Mostafa. "Conception et optimisation d'un nouvel appareil de mesure en temps réel des aérosols radioactifs émetteurs alpha." Paris 11, 1988. http://www.theses.fr/1988PA112213.
The measurement of the atmospheric contaminations due to artificial radioelements alpha emitters (239pu, 241Am, 244Cm,. . . ) is a very difficult problem to resolve because of the three following reasons: the nature of the radiation to detect; very small activities, which correspond to LDCA; existence in the atmosphere of descendants radon and thoron, which are alpha emitters too. To avoid the drawbacks that the present apparatus present, we have conceived, realised and focused a new apparatus based on the following principals: aerosols collection by gaz jet technic on solid state support and measurement in real time under a few millibar presion using a solid detector. First of all, we have tried to make the aerosol collection rate better studying the collector nature and dimension influence, the distance between the collector and the gaz jet exit and the air flow. Using different supports, we have shown that the energy resolution is not depending on the support nature, but it depends very much on atmospheric conditions. Direct measurements of the radioactive samples are made by the annular detector insered between the nozzel and the collector. The good resolution, the efficacity and the discrimination of natural and artificial contaminations show off the feasibility of this apparatus
Ghasemi, Navid. "Improvement of the driving simulator control and comparison between driver-road-vehicule interaction in real and simulated environment." Thesis, Paris Est, 2020. http://www.theses.fr/2020PESC2010.
The related research activities were carried out in collaboration with the University of Bologna, Paris-Est University and Gustave Eiffel University (IFSTTAR) in the form of a cotutelle PhD. The activities are divided into two macro areas ; the driving simulation studies conducted in Gustave Eifel University (IFSTTAR) and on-road experiments organized by the University of Bologna. The first part of the research is focused on improving the physical fidelity of the two DOF driving simulator with particular attention to motion cueing and vehicle dynamics model. The vehicle dynamics model has been developed in MATLAB-Simulink and has the ability of real-time calculation of the vehicle states and control the motion platform. During this phase of the research, motion cueing algorithms were developed to control the simulator movements and the effect of the motion cues on drivers’ behaviour was analysed through experimentation. The results of these studies are discussed in the case studies I and II. In the second part of the research, the driver performance and visual behaviour were studied on the road under different scenarios. The driver visual behaviour was recorded with the use of a head mounted eye-tracking device, while the vehicle trajectory was registered with an instrumented vehicle equipped with Global Positioning System (GPS). During this phase, several case studies were developed to monitor drivers’ behaviour in the naturalistic environment. Case study III aims to integrate the traditional road safety auditing with an innovative driver behaviour monitoring system. The real road experiment with drivers was carried out in an urban arterial road in order to evaluate the proposed approach through innovative driver monitoring techniques. These same driving monitoring instruments were used for evaluating the improvement of a pedestrian crossing at the roundabout in case study IV. The eye-tracking data were evaluated in both studies in order to identify a driver visual attention indicator based on the participants gaze position and duration. Significant attention is given to the safety of vulnerable drivers in urban areas during the naturalistic driving behaviour study. Case study V analyzed the driver yielding behaviour in approach phase to a bicycle priority crossing with the use of surrogate safety measures. The drivers’ performance measures such as perception reaction time and gaze behaviour were used to assess the safety level of the crossing equipped with standard and innovative signalling systems. The improvement on the driver’s yielding behaviour towards an un-signalized crossing during night-time and their reaction to an integrated lighting-warning system was evaluated in the case study VI. The last phase of the thesis is dedicated to the study of Adaptive Cruise Control (ACC) with on-road and simulator experimentation. The on-road experimentation investigated the driver assistant system influence on the drivers' adaptation with objective and subjective assessment, in which an eye tracking instrument and EEG helmet were used to monitor the drivers on a highway. The results are presented in Case studies VII and VIII and drivers’s visual attention was reduced due to adaptation to the ACC in the car following scenario. The results of the on-road test were later used to reproduce to the same scenario in the driving simulator and the adaptation of drivers’ behaviour with the use of ACC was confirmed through experimentation
Vezinet, Didier. "Mesure et analyse du rayonnement Xmou d'un plasma de Tokamak en vue d'un contrôle en temps réel." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM4749/document.
This thesis focuses on measuring and interpreting the Soft X-Ray (SXR) radiation (approximately [1 keV; 15 keV]) in Tokamaks.As explained in Chapter 2, this radiation conveys information about the plasma density, temperature, magnetic equilibrium and impurity content. However, the measured data is spectrally and spatially-integrated and results from several physical phenomena affecting every ion species. Tore Supra's SXR diagnostics is based on semiconductor diodes presented in Chapter 3, along with a new gas detector successfully tested in laboratory and on Tore Supra. A new methodology for absolute spectral characterisation of photo detectors using a portable SXR tube is presented. Tomographic inversion algorithms, that grant access to reconstructions of the SXR emissivity field in a poloidal cross-section, are presented in Chapter 4. Improvements implemented on one particular algorithm are detailed with examples of application. A comparison between the position of the SXR emissivity maximum and the magnetic axis reconstructed by an equilibrium code is presented in Chapter 5.Chapter 6 presents an approach used to derive an impurity density from its SXR emissivity using the robustness of its SXR cooling factor with respect to impurity transport. The physics accounting for this robustness is studied and a first map of the domain of validity of this method is provided. Chapter 7 addresses poloidal asymmetries of the SXR emissivity field. Two types of asymmetries are presented as well as experiments conducted on ASDEX-U to verify their parametric dependences. A new type of SXR asymmetry, observed on Tore Supra is introduced
Janulyte, Aurika. "Etude physico-électrique et optimisation métrologique d'un spectromètre de masse pour la détection temps réel de traces de dioxines." Aix-Marseille 1, 2007. http://www.theses.fr/2007AIX11040.
To increase the ion trap mass spectrometer metrological performance to better detect large molecular weight compounds, i. E. , dioxines, a systematic study of the different mass spectrometric detection stages was performed. In order to increase the ion trap's resolution and sensitivity, different parameters were tested to determine the influence of the corresponding stage's effect of the given parameter on the ion confinement leading to 'damaged' ion spectra. First, principally, power supplies electrical and ion trap's mechanical defects were studied. Secondly, the wave generator electrical environment was studied. In order to confine large molecular mass ions within an ion trap, higher voltage amplitude the wave generator was developed. This wave generator respected criteria of frequency and voltage amplitude stability to better confine large molecular ions such as dioxines
Vercruysse, Michel. "Mesure en temps réel de l'orthogonalité des fils de trame d'un tissu en défilement et son traitement automatique." Lille 1, 1991. http://www.theses.fr/1991LIL10034.
Boukhtache, Seyfeddine. "Système de traitement d’images temps réel dédié à la mesure de champs denses de déplacements et de déformations." Thesis, Université Clermont Auvergne (2017-2020), 2020. http://www.theses.fr/2020CLFAC054.
This PhD thesis has been carried out in a multidisciplinary context. It deals with the challenge of real-time and metrological performance in digital image processing. This is particularly interesting in photomechanics. This is a recent field of activity, which consists in developing and using systems for measuring whole fields of small displacements and small deformations of solids subjected to thermomechanical loading. The technique targeted in this PhD thesis is Digital Images Correlation (DIC), which is the most popular measuring technique in this community. However, it has some limitations, the main one being the computing resources and the metrological performance, which should be improved to reach that of classic pointwise measuring sensors such as strain gauges.In order to address this challenge, this work relies on two main studies. The first one consists in optimizing the interpolation process because this is the most expensive treatment in DIC. Acceleration is proposed by using a parallel hardware implementation on FPGA, and by taking into consideration the consumption of hardware resources as well as accuracy. The main conclusion of this study is that a single FPGA (current technology) is not sufficient to implement the entire DIC algorithm. Thus, a second study has been proposed. It is based on the use of convolutional neural networks (CNNs) in an attempt to achieve both better metrological performance than CIN and real-time processing. This second study shows the relevance of using CNNs for measuring displacement and deformation fields. It opens new perspectives in terms of metrological performance and speed of full-field measuring systems
Lasri, Mohamed Amjad. "Utilisation des réseaux de capteurs Géocubes pour la mesure de déformation des volcans en temps réel par GNSS." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE040/document.
The Geocube system is a network of wireless GPS sensors designed and developed by the Laboratory of Opto-Electronics, Metrology and Instrumentation (LOEMI) of the National Institute of Geographical and Forest Information (IGN) and maintained by the same laboratory and Ophelia-Sensors, the company responsible for its industrialization. Its purpose is to measure ground deformations with millimetre accuracy. This sensor network has the particularity of being very low in energy consumption, low cost, easy to install and easy to use. It is suited for use in harsh environments, such as volcanoes. This system has already been successfully tested in a previous works on the Argentière glacier and a Super-Sauze landslide in France. The first part of this thesis deals with the optimization of the Geocube system for larger networks, horizontally and vertically, in order to use it in a volcanic context. First, a new strategy to estimate the tropospheric bias has been implemented into the Kalman filter (the heart of the Geocube processing software) in real time and in post-processing. This improvement is then validated using data from some national and international permanent GNSS networks. The second part consists in studying the contribution of a dense Geocubes network to the study of volcanism through an experiment conducted on the southeastern flank of Etna, where five Geocubes were deployed between July, 12th 2016 and July, 10th 2017. The results obtained from this experiment are discussed and analysed. Finally, the results obtained with Geocubes are validated by applying a PSI (Persistent Scatterer InSAR) technique on RADAR interferograms calculated from Sentinel-1A/B satellite data covering the period of deployment of the Geocubes on Etna. These two methods (GPS and RADAR) turned out to be complementary since RADAR provides the spatial density of measurements and the Geocube system provides accuracy and temporal continuity
Piatyszek, Éric. "Détection de dysfonctionnements en système hydrographique : application aux réseaux d'assainissement." ENSMP, 1998. http://www.theses.fr/1998ENMP0838.
Bon, Christophe. "Relation pression-vitesse d'une classe d'écoulement instationnaire : application à la mesure des débits instantanés." Poitiers, 1996. http://www.theses.fr/1996POIT2256.
Bernède, Jean-Pierre. "Algorithmes adaptatifs et qualitatifs de prévision des crues en temps réel : application au cas de l'Aveyron." Toulouse, INPT, 1990. http://www.theses.fr/1990INPT060H.