Dissertations / Theses on the topic 'Cartes perforées, Systèmes de'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cartes perforées, Systèmes de.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Neumann, Cédric. "De la mécanographie à l’informatique : les relations entre catégorisation des techniques, groupes professionnels et transformations des savoirs managériaux." Paris 10, 2013. http://www.theses.fr/2013PA100149.
Full textThe history of information processing considers that the apparition and use of computers fall within a broader movement of mechanization of administrative tasks and more generally of writing. This vivid prospect allows relativizing analyses dealing with the « society of information » in which the use of computers is an unprecedented phenomenon, leading to brutal and first ever society transformations, thanks to a growing production of information circulating fast. The continuity between the « mécanographiques » machines and computers can be seen at the level of the manufacturers as well as at the level of the clients and their uses. It does not explain however why computers have no longer been seen as a development of « mécanographie » but as a radically different phenomenon in the 1960s. This thesis will precisely deal with the elaboration of this difference. For that purpose, our work will analyze a relatively short period compared to previous analysis: 1945 to 1975. This period is first characterized by the extension of the use of punched cards machines, then by their progressive replacement by computers. It happened in a delimited area, France, in which the invention of a new term, « informatique » highlights the symbolic difference between « mécanographie » and computers. To understand why « informatique » could appear as a « revolution » compared to « mécanographie », one should not restrict the analysis to the uses of the different equipment but restitutes the relations of equivalence existing between the machines, the staff using it, the different activity fields of companies, and the knowledge the latter require. This transformation of these relations explains why comparable uses of different equipment have actually come along with the elaboration of so heterogeneous and antinomic categories as « mécanographie » and « informatique ». We show that the notion of « mécanographie », used to describe the range of equipment rationalizing the administrative tasks is aligned with the principles of scientific management. « La mécanographie » is primarily justified by the increase of the productivity of administrative work. The latter relies on a narrow specialization of «mécanographes » and the use of a female staff for the most depreciated tasks. The « mécanographe » staff is briefly trained, most of the time by the manufacturers themselves (ch. 1). On the contrary, the use of computers is no longer only linked to productivity but to the improvement of management quality. The close association of computers with conception and direction tasks give birth to the notion of « informatique » in the economic field and to beliefs inherent to the «révolution informatique » (ch. 2). In this context, individuals working on computers are no longer considered like a staff executing but conceiving, which leads to the creation of a labor market of computer engineers autonomous from the one of the machines. The assimilation of computer engineers to executives and the rise of the cultural capital required contributed to exclude the majority of former « mécanographes » from computer-related jobs and to increase the difference between « informatique » and « mécanographie » (ch. 3). The distinct properties of computer engineers compared to « mécanographes » are reinforced by the creation of university-level training in computer engineering to supply the labor market of specialists. Nonetheless, the content of these trainings shows the struggling between the university professors teaching those and the employers (ch. 4). Finally, as opposed to « mécanographie », « informatique » is considered as a specific tool for the majority of the executives. This is due on one hand to the « grandes écoles » introducing the teaching of computer engineering in their curriculum, transforming the latter in a mandatory know-how for the students (ch. 5); and on the other hand to the transformation of executives into « users » via the permanent training, conceived as a means to get optimal use of «’informatique » (ch. 6)
Richomme, Paulette. "Une entreprise à l’épreuve de la guerre et de l’Occupation : la compagnie des machines Bull, 1939-1945." Paris 10, 2007. http://www.theses.fr/2007PA100208.
Full textLecomte, Sylvain. "COST-STIC Cartes Orientées Services Transactionnels et Systèmes Transactionnels Intégrant des Cartes." Phd thesis, Université des Sciences et Technologie de Lille - Lille I, 1998. http://tel.archives-ouvertes.fr/tel-00457654.
Full textChen, Linxiao. "Cartes planaires aléatoires couplées aux systèmes de spins." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS096/document.
Full textThe aim of this thesis is to improve our understanding of random planar maps decorated by statistical physics models. We examine three particular models using tools coming from analysis, combinatorics and probability. From a geometric perspective, we focus on the interface properties and the local limits of the decorated random maps. The first model defines a family of random quadrangulations of the disk decorated by an O(n)-loop model. After completing the proof of its phase diagram initiated in [BBG12c] (Chap. II), we look into the lengths and the nesting structure of the loops in the non-generic critical phase (Chap. III). We show that these statistics, described as a labeled tree, converge in distribution to an explicit multiplicative cascade when the perimeter of the disk tends to infinity. The second model (Chap. IV) consists of random planar maps decorated by the Fortuin-Kasteleyn percolation. We complete the proof of its local convergence sketched in [She16b] and establish a number of properties of the limit. The third model (Chap. V) is that of random triangulations of the disk decorated by the Ising model. It is closely related to the O(n)-decorated quadrangulation when n=1. We compute explicitly the partition function of the model with Dobrushin boundary conditions at its critical point, in a form ameneable to asymptotics. Using these asymptotics, we study the peeling process along the Ising interface in the limit where the perimeter of the disk tends to infinity.Key words. Random planar map, O(n) loop model, Fortuin-Kasteleyn percolation, Ising model, local limit, interface geometry
Tayong, Boumda Rostand. "Propriétés acoustiques de systèmes incorporant des plaques micro-perforées et des matériaux absorbants sous forts niveaux d'excitation." Thesis, Dijon, 2010. http://www.theses.fr/2010DIJOS066/document.
Full textThis work deals with the acoustical properties of systems incorporating Micro-Perforated Panels (MPP) and absorbing materials under high level of excitation.In the first chapter, absorbent systems composed of an air-cavity backed MPP are studied at high level of excitations. An analytical model involving two dimensionless parameters and an optimum Mach number is proposed. This model describes the behavior of the maximum of absorption coefficient (absorption coefficient at the resonance) with respect to the Mach number inside the perforations. A formula is proposed that predicts the variations of the absorption peak with the acoustical Mach number.In the second chapter, the holes interaction effects are studied theoretically and experimentally under high levels of excitations. Following an equivalent fluid approach, a model for which the tortuosity is corrected to account for the holes interaction effects coupled to the jet-like effects is developed. Multi-layered absorbents composed of MPP and porous materials are then studied under high level of excitations. The case where the multi-layers are directly attached to a rigid wall and the case where there is an air cavity before the rigid wall are examined. Forchheimer's law is used to model each medium of the multi-layer and the use of the transfer matrix method is made to account for these media.Sound transmission study under high level of excitation is introduced. The perspectives of this work are numerous and promising in the acoustics of transportation systems applications
Demmel, Sébastien. "Construction de cartes étendues des difficultés de la route fondée sur la fusion de cartes locales." Versailles-St Quentin en Yvelines, 2012. http://www.theses.fr/2012VERS0051.
Full textThis thesis investigates the use and performance of augmented perception (Cooperative Systems) for assessment of raod risk. We provide a discussion on intervehicular communications (IVC) limitations and performance model built to incorporate them, created from empirical data collected on the tracks. Our results are more pessimistic than existing literature, suggesting IVC limitations have been underestimated. Then, we develop a CS/Augmented perception simulation architecture. This architecture is used to obtain news results on the safety benefits of a cooperative safety application. At the first, we confirm earlier results in terms of crashes numbers decrease, but raise doubts on benefits in etrms of crashes' severity. Then, augmented and single-vehicule perceptions are compared in a reference driving scenarion for risk assessment. Our results show that augmented perception performance, although this might be valid only for our specific scenario. Eventually, we propose a new approach using augmented perception to identify road risk through a surrogate: near-miss events
Pouget, Julien. "Test des systèmes sur puce : ordonnancement et exploration de l'espace des solutions architecturales." Montpellier 2, 2002. http://www.theses.fr/2002MON20094.
Full textMariani, Robert. "Contribution à la lecture automatique de cartes." Rouen, 1997. http://www.theses.fr/1997ROUES090.
Full textLubaszewski, Marcelo Soares. "Le test unifié de cartes appliqué à la conception de systèmes fiables." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 1994. http://hdl.handle.net/10183/26862.
Full textOn one hand, if the goal is to ensure that the design validation, the manufacturing and the maintenance testing, along with the concurrent error detection are efficiently performed in electronic systems, one is led to integrate the off-line and the on-line testing into circuits. Then, for complex systems to make profit of these two types of tests, such unification must be extended from the circuit to the board and module levels. On the other hand, although the unification of off-line and on-line testing techniques makes possible the design of systems suiting any safety application, the hardware added for increasing the application safety also decreases the system reliability, since the probability of occurrence of faults increases. Faced to these two antagonist aspects, this thesis aims at finding a compromise between the safety and the reliability of complex electronic systems. Thus, firstly we propose a solution to the off-line test and diagnosis problems found in the intermediate steps in the evolution towards boards which are 100% compliant with the IEEE standard 1149.1 for boundary scan testing. An approach for the BIST (Built-In Self-Test) of boundary scan circuits and interconnects then illustrates the ultimate step in the board off-line testing. Next, the UBIST (Unified BIST) scheme - merging BIST and self-checking capabilities for circuit on-line testing, is combined with the IEEE standard 1149.1, in order to obtain a design strategy for unifying the tests of interconnects and circuits populating boards and modules. Finally, we propose a fault-tolerant scheme based on the duplication of these kind of modules which ensures the competitivity of the resulting system in terms of reliability at the same time as preserving the inherent module safety.
Lubaszewski, Marcelo. "Le test unifié de cartes appliqué à la conception de systèmes fiables." Grenoble INPG, 1994. http://www.theses.fr/1994INPG0055.
Full textOn one hand, if the goal is to ensure that the design validation, the manufacturing and the maintenance testing, along with the concurrent error detection are efficiently performed in electronic systems, one is led to integrate the off-line and the on-line testing into circuits. Then, for complex systems to make profit of these two types of tests, such unification must be extended from the circuit to the board and module levels. On the other hand, although the unification of off-line and on-line testing techniques makes possible the design of systems suiting any safety application, the hardware added for increasing the application safety also decreases the system availability and reliability, since the probability of occurrence of faults increases. Faced to these two antagonist aspects, this thesis aims at finding a compromise between the safety and the reliability of complex electronic systems. Thus, firstly we propose a solution to the off-line test and diagnosis problems found in the intermediate steps in the evolution towards boards which are 100% compliant with the IEEE standard for boundary scan testing. An approach for the BIST (Built-In Self-Test) of boundary scan circuits and interconnects then illustrates the ultimate step in the board off-line testing. Next, the UBIST (Unified BIST) scheme - merging BIST and self-checking capabilities for circuit on-line testing, is combined with the IEEE standard for boundary scan testing, in order to obtain a design strategy for unifying the tests of interconnects and circuits populating boards and modules. Finally, we propose a fault-tolerant scheme based on the duplication of these kind of modules which ensures the competitivity of the resulting system in terms of reliability at the same time as preserving the inherent module safety
Fouque, Clément. "Apport des cartes routières navigables pour le positionnement par satellites des véhicules terrestres." Compiègne, 2010. http://www.theses.fr/2010COMP1883.
Full textFor many intelligent transportation systems applications, the vehicle position is a key information. In this thesis, the use of navigable road-map for global positioning is investigated. Using a thigtly-coupled approach, the map can provided additionnal information in the computation. First, the geometrical information from the map is introduced in a standard GPS computation and in a Kalman filter approach to aid the global positioning. The experimental results shows that the map is able to compensate for the lack of intention due to satellites outages. It also illustrated the need of an effective road selection process. Finally, the problem of map-constraint positioning have been considered in a multi-hypothesis bayesian framework. The problem is stated as a hybrid state system involving continous and discrete states. Thus, the constrained positioning can be solved without a prior global location as illustrated results. In addition, this method allows the identification of ambigous area in spite of partial outages and map biases
Pallaver, Tanguy. "Auto-adaptativité et topologie dans les cartes de Kohonen." Thesis, Université Laval, 2006. http://www.theses.ulaval.ca/2006/23655/23655.pdf.
Full textUsing biological understanding we have modified the unsupervised Kohonen algo- rithm, with two aims : to improve the performance of modelisation and to make this theoretical model of neural self-organisation more realistic. At various stages during our research into the auto-adaptivity and topology of Kohonen maps, we implemented our findings into practical algorithms creating normalised, multirhythmic and self-instructed versions. Two new functions are introduced : local attractivity AintL , inspired from Growing Neural Gas networks (GNG), and knowledge Cint. Using these, modelisation error is reduced by up to 80% of the standard error. Guided by recent work that shows small-world topologies exist in a large number of networks, we have extended this classic approach to information theory. This has highlighted the temporal link between structure (topology) and function (learning and knowledge) in the neural system.
Hélie, Thomas. "Modélisation physique d'instruments de musique en systèmes dynamiques et inversion." Paris 11, 2002. http://www.theses.fr/2002PA112315.
Full textThis work deals with the modeling and the inversion process "sound/instrumental gesture" of musical instruments with like standard application : brasses and production of the voice. The physical modeling has large a interest for the sound synthesis since it generates not only the sound but also the behavior of the instrument (attacks, transients, false notes, etc). For these reasons, the difficulty of playing with virtual instruments is comparable to that of real instruments. The difficulty of controlling such models leads to the question of the inversion process : "how do I control my model to obtain this target sound that this musician obtained with his own instrument?" To cope with this problematic, we first indicate that the synthesis modeling and the associated inverse system may be thought together. Our thesis presents a work aiming to obtain mathematic objects as simple as possible. The problem of the excitor (lips, reeds, etc. . ) has been considered during our Master's Thesis. That of the resonator (description of the propagation in a pipe with a varying cross-section and its radiation) are thus the principal object of this work. In the first part, we establish a new model 1D of the acoustic propagation in axisymmetrical pipes with a slowly varying cross-section. This model makes it possible to take into account for example the motion of walls (case adapted with the vocal tract), or the existence of visco-thermic losses (which involes fractional derivatives). For this last case, it is possible of represent the whole guide by concatenating input-ouput systems associated with pieces of pipes locally adapted with the curvature of the pipe. As the involved transfer functions are too complicated to allow the derivation of a low cost time-simulation, we propose two methods which approach them with linear differential systems of finite order with delay. These methods are based on, respectively, troncated divergent series, and the theory of the diffusive representations of pseudo-differential operators. In the second part, a new model of the radiation of the bell which takes the wavefront curvature is developed and used to model the boundary condition at the output of the instrument. The results of this work may be used for the study of the brasses and, partially, for the vocal tract
Verdier, Marianne. "Interchanges et tarification des systèmes de paiement par carte." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00005184.
Full textVan, Hoecke Marie-Pierre. "Contribution à la modélisation des systèmes d'information communicationnels intégrant des cartes à micro-processeur." Lille 1, 1996. http://www.theses.fr/1996LIL10006.
Full textJean, Sébastien. "Modèles et architectures d'interaction interne et externe pour cartes à microprocesseur ouvertes." Lille 1, 2001. https://pepite-depot.univ-lille.fr/RESTREINT/Th_Num/2001/50376-2001-329.pdf.
Full textNous présentons le résultat de recherches portant sur les deux derniers types d'arrangements et poursuivant deux objectifs. Nous souhaitions, d'une part, définir un cadre cohérent pour l'intégration de cartes ouvertes réactives au sein de systèmes d'information répartis (i. E. Où les applications encartées peuvent être à la fois clientes et serveurs) et, d'autre part, pouvoir disposer d'un support de coopération interne permettant un partage fin, contrôlé et évolutif, tant des informations que des compétences des applications encartées. Apporter une réponse au premier problème a un impact sur l'ensemble de l'infrastructure logicielle. La solution que nous avons proposée, baptisée AWARE, est le reflet de cette globalité. Elle s'articule autour d'un modèle d'exécution multi-tâches pour cartes ouvertes, où l'ordonnancement des tâches s'effectue depuis l'extérieur de la carte, et s'accompagne d'un modèle de programmation facilitant la conception d'applications réparties intégrant de telles cartes. Nous avons également proposé un modèle de coopération intra-carte basé sur quelques-uns des principes des bases de données relationnelles
Premont, Christophe. "Etude et conception d'un composant analogique programmable en technologie CMOS standard." Lyon, INSA, 1998. http://www.theses.fr/1998ISAL0028.
Full textThis thesis is concerned with the study and the design of a field-programmable analogue array with a CMOS standard process. This circuit is an analogue cells based array. Each cell is programmable and can achieve various analogue functions with specific performance. Beside, the interconnections between the cells have to be programmable. The array configuration is achieved using a digital or an analogue interface circuitry to implement a particular function. For a flexible programmability and high-electrical performance, a new approach based and a transresistor amplifier using current conveyors have been developed to control full-differential transconductances. This report falls into six chapters. The first one deals with the concept of field programmable analogue array. The second chapter presents a methodology for describing analogue circuits. The array architecture is studied according to the requirements for such a programmable circuit. The main feature of the third chapter is to introduce the current-mode approach with the current conveyor. The fourth chapter presents the programmable analogue cell designed during the project. The structure of the analogue array and the proposed solutions are thoroughly described in the fifth chapter. The last chapter presents some application examples and it focuses on future works
Perozo, Niriaska. "Modélisation multi-agents pour systèmes émergents et auto-organisés." Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1531/.
Full textIn this work a multi-agent architecture for self-organizing and emergent systems (MASOES) is defined. This architecture allows the possibility of modeling a self-organizing and emergent system through a society of agents (homogenous or heterogeneous), who work in a decentralized way, with different types of behavior: reactive, imitative or cognitive. Also they are able to dynamically change their behavior according to their emotional state, so that the agents can adapt dynamically to their environment, favoring the emergence of structures. For it, a two-dimensional affective model with positive and negative emotions is proposed. The importance of this affective model is that there are not emotional models for studying and understanding how to model and simulate emergent and self-organizing processes in a multi-agent environment and also, its usefulness to study some aspects of social interaction multi-agent (e. G. The influence of emotions in individual and collective behavior of agents). On the other hand, a methodology for modeling with MASOES is specified, it explains how to describe the elements, relations and mechanisms at individual and collective level of the society of agents, that favor the analysis of the self-organizing and emergent phenomenon without modeling the system mathematically. It is also proposed a verification method for MASOES based on the paradigm of wisdom of crowds and fuzzy cognitive maps (FCMs), for testing the design specifications and verification criteria established such as: density, diversity, independence, emotiveness, self-organization and emergence, among others. It also shows the applicability of MASOES for modeling diverse case studies (in a diversity of contexts) such as: Wikipedia, Free Software Development and collective behavior of pedestrians through the Social Force Model. Finally, the two models proposed in MASOES: the initial multi-agent model and the model with FCMs based on that initial multi-agent model complement each other. This means that it is possible to test the multi-agent model through the meta-model based on FCMs. Besides, it represents a novel alternative to study, test, verify or validate self-organization and emergence in complex systems and test the multi-agent model, since it is difficult to make tests in these systems directly, given the level of uncertainty and complexity they manage
Bouttier, Jérémie. "Physique statistique des surfaces aléatoires et combinatoire bijective des cartes planaires." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2005. http://tel.archives-ouvertes.fr/tel-00010651.
Full textKamel, Nassima. "Sécurité des cartes à puce à serveur Web embarqué." Limoges, 2012. https://aurore.unilim.fr/theses/nxfile/default/9dc553cd-e9df-4530-a716-d3191d68dfa0/blobholder:0/2012LIMO4039.pdf.
Full textSmart cards are widely used secure devices in today’s world, which can store data in a secured manner and ensure data security during transactions. The success of smart card is mainly due to their tamper-resistant nature which allows them to store sensitive data’s like cryptographic keys. Since they are using in multiple secure domains, like banking, health insurance, etc. More and more researches are taken place in this domain for security and attacks. The last generation of smart card, defines an embedded web server. There are two types of specifications for these devices, the first one is defined by OMA organisation that propose a simple HTTP web server named Smart Card Web Server (SCWS), the second is proposed by Sun Microsystems (currently Oracle), consists of a Java card 3 connected edition platform, that includes a Java servlet 2. 4 API with improved Java Card API and security features. In addition to network benefits from the robustness of smart card, the use of web standards provide a continuous user experience, equivalent to that seen while surfing on the internet and it enhances the look and feel of GUI interfaces. The GUI interfaces are accessible from a browser which is located on the terminal on which the card is connected. However, in addition to the classical attacks (physical and logical), the integration of web server on smart card, exposes the smart card to some existing classical web application attacks. The most important one is the cross site scripting attack, also named XSS. It consists of injecting malicious data to the given web application inputs and if the resource returned to the browser includes the malicious code, it will be interpreted and executed, causing an attack. A web application is vulnerable to XSS if it uses an untrusted data without filtering malicious characters before. On the other hand, to ensure the communication between web applications and browser or other network entities, it is necessary to integrate some protocols to the smart card, for example HTTP, BIP or TCP/IP. The vulnerabilities in the implementation of these protocols can facilitate some attacks. Our contribution on this thesis is divided in two parts, in the first part, we are interested on the security of web applications against XSS attack. We suggest a static analysis tool, based on tainting approach, that allow to verify if a web application is secured or not, including filtering data in all insertion points where XSS is possible. We also implement, an API filter, compatible with Java Card 3 platform, that developers can import during the development of their applications. The second part consists of verifying the conformance and the robustness of the implemented HTTP protocol. For that we propose an intelligent fuzzing tool that includes a set of optimisations that allows to reduce the time of fuzzing
Séré, Ahmadou Al Khary. "Tissage de contremesures pour machines virtuelles embarquées." Limoges, 2010. http://aurore.unilim.fr/theses/nxfile/default/ec9d960e-5234-4fd7-a38f-bd8107443f05/blobholder:0/2010LIMO4017.pdf.
Full textOur goal, is to propose some way to guaranty that we can detect that a fault attack occurs tampering the smart card ship. And we want to do this in an automatic way that is affordable in resources (memory and CPU averhead) for the card. To achieve this goal, we use a functionality introduced by Java Card 3, the security annotations that allow a programmer to choose sensitive methods or classes of his application. Allowing the virtual machine to execute them in a secured mode. The developed approach is to use security information introduce in application code and to modify the java virtual machine to make good use of them to detect the attack. These researches focus on proposing different mechanisms that can help to fight against fault attacks in verifying during runtime the code integrity or the control flow integrity
Barbu, Stefan. "Conception et réalisation d'un système de métrologie RF pour les systèmes d'identification sans contact à 13,56 MHz." Université de Marne-la-Vallée, 2005. http://www.theses.fr/2005MARN0219.
Full textThe 13. 56 MHz "Contactless" systems become more and more efficient in terms of speed, memory capacity, security, etc. New research axes deal with these aspects, imposing a complete control of the physical layer, thus a thorough knowledge of the RF part. With the diversification of the consumer electronics products and the arrival of new standards such as the NFC, more and more electronic systems become equipped with a 13. 56 MHz "contactless" interface. In order to maximise the integration capacity and to control the interaction between the "RFID" part and the rest of the system, we need to control the RF parameters. The boom of "contactless" applications, such as access control, ticketing, electronic passports and visas, ID cards, for mentioning only the most widespread, imply large production volumes. From an industrial point of view, the thorough knowledge of the RF part is essential, not only for optimising manufacturing costs, but also for treating the field return. The current standardisation context provides a minimum of elements for assuring the good functioning of the "contactless" systems. In this case, the interoperability cannot be assured. Moreover, respecting a gauge does not allow an expert appraisal of the system functioning, the problems encountered in production and in field not being diagnosed in a precise manner. The subject of the present thesis is the design and the development of a metrology system for the 13. 56 MHz "contactless" systems' RF part. We have proposed ourselves to establish a methodology and some tools allowing to characterise the RF behaviour of inductive-coupling RFID system, and particularly contactless smartcards. The personal contribution can be synthesized through three approaches : 1. Exhaustive – thorough analysis of the system and its functioning 2. Curative – solving the functioning problems 3. Preventive – design and simulation The functioning problematic is analysed, emphasising most of the frequently encountered problems with the RF part of the "contactless" systems. To the problem-solving oriented work we added a component linked to the design of such devices
Peltier, Thierry. "La carte blanche : un nouveau système d'exploitation pour objets nomades." Lille 1, 1995. http://www.theses.fr/1995LIL10166.
Full textAkkar, Mehdi-laurent. "Attaques et méthodes de protections de systèmes cryptographiques embarqués." Versailles-St Quentin en Yvelines, 2004. http://www.theses.fr/2004VERS0014.
Full textEn 1998, les attaques par consommation de courant et par injection de fautes commençaient à peine à apparaître. C'est ainsi que j'ai eu la chance de suivre,et de participer parfois, aux innovations qui ont conduit tant à mettre en oeuvre de nouvelles attaques, qu'à élaborer de nouvelles contre-mesures. Ce mémoire de thèse présente mon travail tant d'un point de vue assez théorique (modèle de consommation de la carte, protections théoriques, principes généraux de scénarios d'attaques) que pratique (vérification de la théorie, implémentations sécurisées, attaques réelles) sur les algorithmes usuels tels que le DES, l'AES ou le RSA. La plupart de ces résultats ont été publiés dans plusieurs conférences (Asiacrypt, CHES, FSE, PKC) et brevetés
Saint-Martin, Olivier. "Etude et réalisation de systèmes intégrés en imagerie numérique : application à l'inspection visuelle automatique de cartes électroniques équipées." Toulouse 3, 1990. http://www.theses.fr/1990TOU30002.
Full textLouf, Baptiste. "Cartes de grand genre : de la hiérarchie KP aux limites probabilistes." Thesis, Université de Paris (2019-....), 2020. http://www.theses.fr/2020UNIP7020.
Full textThis thesis focuses on combinatorial maps, which are defined as embeddings of graphs on surfaces, or equivalently as gluing of polygons. The genus g of the map is defined as the number of handles of the surface on which it is embedded.In addition to being combinatorial objects, the maps can be represented as factorizations of permutations, which also makes them algebraic objects, which one can study in particular thanks to the representation theory of the symmetric group. In particular, these algebraic properties of maps mean that their generating series satisfies the KP hierarchy (and its generalization, the 2-Toda hierarchy). The KP hierarchy is an infinite set of partial differential equations in an infinity of variables. The partial differential equations of the KP hierarchy are then translated into recurrence formulas which make it possible to enumerate maps of any genus.On the other hand, it is interesting to study the geometric properties of maps, and in particular very large random maps. Many works have focused on the geometrical properties of planar maps, ie of genus 0. In this thesis, we study maps of large genus, that is to say whose genus tends towards infinity at the same time as the size of the map. What will particularly interest us is the notion of local limit, which describes the law of the neighborhood of a particular point (the root) of large uniform random maps.The first part of this thesis (Chapters 1 to 3) is an introduction to all the necessary concepts: maps, of course, but also the KP hierarchy and local limits. In a second part (Chapters 4 and 5), we will seek to deepen the relationship between maps and KP hierarchy, either by explaining existing formulas by combinatorial constructions, or by discovering new formulas. The third part (Chapters 6 and 7) focuses on the study of the local limits of large maps, using in particular the results obtained from the KP hier-archy. Finally the manuscript ends with some open problems (Chapter 8)
Combier, Camille. "Mesures de similarité pour cartes généralisées." Phd thesis, Université Claude Bernard - Lyon I, 2012. http://tel.archives-ouvertes.fr/tel-00995382.
Full textDeville, Damien. "CamilleRT : un système d'exploitation temps réel extensible pour carte à microprocesseur." Lille 1, 2004. https://ori-nuxeo.univ-lille1.fr/nuxeo/site/esupversions/9f245270-7f66-4a80-842b-e1a2e267e31b.
Full textClavier, Christophe. "De la sécurité physique des crypto-systèmes embarqués." Versailles-St Quentin en Yvelines, 2007. http://www.theses.fr/2007VERS0028.
Full textIn a world full of threats, the development of widespread digital applications has led to the need for a practical device containing cryptographic functions that provide the everyday needs for secure transactions, confidentiality of communications, identification of the subject or authentication for access to a particular service. Among the cryptographic embedded devices ensuring these functionalities, smart cards are certainly the most widely used. Their portability (a wallet may easily contain a dozen) and their ability to protect its data and programs against intruders, make it as the ideal ``bunker'' for key storage and the execution of cryptographic functions during mobile usage requiring a high level of security. Whilst the design of mathematically robust (or even proven secure in some models) cryptographic schemes is an obvious requirement, it is apparently insufficient in the light of the first physical attacks that were published in 1996. Taking advantage of weaknesses related to the basic implementation of security routines, these threats include side-channel analysis which obtains information about the internal state of the process, and the exploitation of induced faults allowing certain cryptanalysis to be performed which otherwise would not have been possible. This thesis presents a series of research works covering the physical security of embedded cryptosystems. Two parts of this document are dedicated to the description of some attacks and to a study of the efficiency of conceivable countermeasures. A third part deals with that particular and still mainly unexplored area which considers the applicability of physical attacks when the cryptographic function is, partly or totally, unknown by the adversary
Blanchet, Jérôme. "Nouveau critère pour analyser la stabilité des distances de voisinage sur les cartes auto-organisatrices." Orléans, 2005. http://www.theses.fr/2005ORLE2075.
Full textHuet, Thierry. "Généralisation de cartes vectorielles d'occupation des sols : une approche par triangulation coopérative pour la fusion des polygones." Toulouse 1, 1996. http://www.theses.fr/1996TOU10065.
Full textMap generalization consists in transforming representations of geographic space in such a way as to enable spatial data to be mapped at various levels of abstraction. The work presented in this thesis is specifically concerned with the generalization of land use vector maps. The investigations into the state of-the-art performed in chapter one show that while generalization tools and methods exist, they are only applicable to raster data or topographic maps. The specificity of our investigation resides in the fact that information on a land use map is present throughout the map while a topographic map has blank areas. Existing generalization tools are therefore not applicable to land use vector maps. After presenting various models required for generalization, the author analyzes existing methods and tools from the standpoint of land use. In chapter two, a methodology is proposed implementing several generalization operators adapted to the task. Our method is based on the use of a land use-specific database, Corine Land Cover, and is put to a practical test at the end of the chapter using a model built with arc/info software. While the results obtained are satisfactory, our method - like all existing methods - do not provide a sufficient management power for the changeable nature of geographical data: it uses sequential processes and remains difficult to implement since generalized data must be re-computed whenever the initial data is upgraded. In response to this problem, chapter three presents a new merging method based on triangulation whose main feature is to provide a consistent way of processing polygons. This method allows us to propose a model based on spatio-temporal objects as polygon activity is described by an extension of the Pétri net formalism. Complete models of these active spatio-temporal polygons are presented at the end of the chapter and are implemented in the looping environment
Calenzo, Patrick. "Développement de nouvelles architectures mémoires non volatiles bas coût et basse consommation." Aix-Marseille 1, 2009. http://www.theses.fr/2009AIX11051.
Full textThe objectives of this thesis are to conceive and to develop non volatile memories with floating gate which are low cost, low voltage consumption and compatible with a CMOS standard logic process. In order to be carried out, a state of the art has put forth the cells which are “high-achieving” in this technology. This has permitted to see the qualities and the defects of the cells and enabled to target the main points which need careful consideration. From this onwards, a calibration methodology, usable for any semi conductor device, has been developed. This methodology was put into practice on an EEPROM cell, which served as the foundations for the development of the memory cells, throughout this paper. Furthermore, a single poly silicon double implant memory cell has been studied. This cell has been developed from its operating concept to its electric validation on silicon. The manufacturing process suggested gave way to a single poly-silicon memory cell in a CMOS logic technology. In addition, the cell consumption is in perfect accordance with the low voltage consumption criteria. Finally, this cell is interesting in regards to its size which is only 1,1 μm² in a technology of 0,13 μm. This makes it the smallest existing cell for this particular type of memory. In parallel to this work, another single poly silicon cell, which exists in two different versions, has been suggested. These cells have the particularity to be created in a shallow trench isolation. This reinforces the idea of low cost because the surface of the unit cell can be reduced but at the same time remains compatible with a CMOS standard logic process. All the basics needed to create this cell have been validated electrically and give way to encouraging energy consumption results. The outlook for this work would be to improve the two developed concepts in order to have them industrialized
Andronick, Liège June. "Modélisation et vérification formelles de systèmes embarqués dans les cartes à microprocesseur : plate-forme Java Card et système d'exploitation." Paris 11, 2006. http://www.theses.fr/2006PA112085.
Full textThe work presented in this thesis aims at strengthening the security and safety level of smart card embedded systems, with the use of Formal Methods. On one hand, we present the formal verification of the isolation of the data belonging to different applets loaded on the same card. More precisely, we describe the formal proof, in the Coq proof system, that the run-time access control, performed by the Java Card platform, ensures data confidentiality and integrity. On the other hand, we study the correctness and the safety of low level source code of an embedded operating system. Such source code is illustrated by a case study of a Flash memory management module, using a journalling mechanism and ensuring the memory consistency in the case of a card tear. The verification of functional and local properties has been developed using the Caduceus program verification tool. Since this tool does not support some low level constructions of the C language, such as the unions and the casts, we propose an analysis and some solutions for the formalisation of such constructions. We also propose an extension of Caduceus that allows to specify and verify the behaviour of a function in the case of sudden interruption of its execution. Then, we introduce a methodology for the verification of high level and global properties, which is meant for the expression and proof of this kind of properties on a model formally linked to the source code. More precisely, we describe an automatic extraction of a transition system from the annotations that are verified by the source code. This transition system can then be translated in a high order logic
Dandjinou, Toundé Mesmin. "Une architecture d'administration de cartes à puce, similaire à OTA, et dédiée aux réseaux sans fil IP." Paris, ENST, 2006. http://www.theses.fr/2006ENST0052.
Full textIP wireless networks are invading most of our life areas. But the lack of secured access of these networks is a serious brake for the development of new services in them. In our work, we propose to use smart cards as security modules, as it is the case in the mobile radio telephony networks GSM. For this purpose in spite of smart cards limitations of their computational and storage capabilities, we suggest a new protocol named EAP-SSC (EAP Secured Smartcard Channel). This protocol is dedicated to the mutual authentication using both symmetrical and asymmetrical cryptographic keys contexts. As IP wireless networks are operated by various administrative authorities, it is necessary to anticipate the consideration of the diversity of the underlined security politics. So, we propose a platform named OpenEAPSmartcard intended to be set up in every Java card of the market place. This platform is opened and easy for being convenient for new authentication scenarios chosen by the computer programmers. Security of cryptographic materials stored on the servers is not safeguarded, because of the operating systems flaws and vulnerabilities; access points closed to the users are less sheltered from attacks. For that reason we suggest to create authentication micro-servers that correspond to EAP servers included in the Java smart cards. The deployment of those micro-servers on a large scale will cause the problem of keeping them up to date. We propose a software architecture called TEAPM (Trusted EAP Module) which heart is formed by EAP and EAP-TLS surrounded by XML and HTTP protocols. This architecture allows the "On The Air" secured administration of the micro-servers
Chesneau, Élisabeth. "Modèle d'amélioration automatique des contrastes de couleur en cartographie : application aux cartes de risques." Université de Marne-la-Vallée, 2006. http://www.theses.fr/2006MARN0294.
Full textGrimm, Martial. "Proposition d'une nouvelle méthode de transformation de signaux video rvb/hsi : application aux systèmes de vision couleur temps réel." Nancy 1, 1994. http://docnum.univ-lorraine.fr/public/SCD_T_1994_0322_GRIMM.pdf.
Full textRegnauld, Nicolas. "Généralisation du bâti : structure spatiale de type graphe et représentation cartographique." Aix-Marseille 1, 1998. http://www.theses.fr/1998AIX11022.
Full textAl, Assaad Hiba. "Apport des modèles numériques d'élévation pour l'enrichissement des cartes de navigation par fusion multi-capteurs." Thesis, Littoral, 2020. http://www.theses.fr/2020DUNK0558.
Full textTe work presented in this thesis concerns the study of a multi-sensor fusion method for the estimation of 3-D localization and the attitude of a land vehicle. We have developed and validated, in a real situation, a centralized fusion method based on state modeling from GNSS/INS measurements delivered by the ublox EVK-M8U sensor. The measurement system is also completed by OSM digital road maps and elevation data from the ASTER/World 30 digital models. Some measurements are modeled by equations with strong non-linearities which we have chosen to process by particle filtering. The cartographic data are taken into account statistically from the metric of Mahalanobis. In addition, we have developed a new method for managing digital elevation models (DEM), known as the "Fenêtre Glissante Adjacente" (FGA) method, in order to limit the impact of the artifacts that are found in this data. During the DEM management step, we implemented geometric approaches (TIN, FGA) which make the altitude correction more robust and favors an increase in performance in estimating the inclination parameter of the segments of the digital road maps
Santucci, Jean-François. "Contribution à l'élaboration de THESEE, un système à base de connaissance d'aide à la génération de séquences de test pour les cartes digitales." Aix-Marseille 3, 1989. http://www.theses.fr/1989AIX30016.
Full textSoulat, Laurent. "Définition, analyse et optimisation d'un nouveau concept de traitement de carter au moyen d'outils numériques : application aux turbomachines basse vitesse." Phd thesis, Ecole Centrale de Lyon, 2010. http://tel.archives-ouvertes.fr/tel-00564495.
Full textGrabski, Krystyna. "Les cartes sensorimotrices de la parole : Corrélats neurocognitifs et couplage fonctionnel des systèmes de perception et de production des voyelles du Français." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00753249.
Full textSassatelli, Gilles. "Architectures reconfigurables dynamiquement pour les systèmes sur puce." Montpellier 2, 2002. http://www.theses.fr/2002MON20052.
Full textCaquard, Sébastien. "Des cartes multimédias dans le débat public : pour une nouvelle conception de la cartographie appliquée à la gestion de l'eau." Saint-Etienne, 2001. http://www.theses.fr/2001STET2072.
Full textCordry, Julien. "La mesure de performance dans les cartes à puce." Phd thesis, Conservatoire national des arts et metiers - CNAM, 2009. http://tel.archives-ouvertes.fr/tel-00555926.
Full textArthus, Isabelle. "Détermination des besoins en informations : proposition d'une méthodologie utilisant les cartes cognitives pour aider les managers à déterminer leurs informations décisionnelles." Grenoble 2, 1997. http://www.theses.fr/1997GRE21010.
Full textA manager needs informations to make decisions and actions. These informations should help him to reach his objectives. They are difficult to determine. Because they depend on the cognitive style of the manager and the vision he has of his task. This research proposes a method to guide the data choice. It combines cognitive mapping (soda) with a critical success factors approach. The cognitive map is a group map but the data choice is individual. This process allows the managers to determine the set of available informations. The methodology has been tested through a management simultation by a laboratory experimentation. This test shows that the use of the method increases the managers environment knowledge and it helps them to choose decision-oriented informations. It also shows the existence of an efficient communication between the producer and the consumer of informations and then the definition of information. End last, this sort of methodology seems to be indicated to determine the cross-functional informations
Saleh, Hayder. "Une architecture novatrice de sécurité à base de carte à puce Internet." Versailles-St Quentin en Yvelines, 2002. http://www.theses.fr/2002VERSA009.
Full textEluard, Marc. "Analyse de sécurité pour la certification d'applications java card." Rennes 1, 2001. http://www.theses.fr/2001REN10079.
Full textParadinas, Pierre. "La Biocarte : intégration d'une carte à microprocesseur dans un réseau professionnel santé." Lille 1, 1988. http://www.theses.fr/1988LIL10100.
Full textSauveron, Damien. "Etude et réalisation d'un environnement d'expérimentation et de modélisation pour la technologie Java Card : application à la sécurité." Bordeaux 1, 2004. http://www.theses.fr/2004BOR12930.
Full textGuidez, Ludovic. "Conception de cartes de contrôle assistée par ordinateur et calculs de capabilités appliqués aux processus non gaussiens : application à la production d'embrayages." Compiègne, 1997. http://www.theses.fr/1997COMP1068.
Full text