Contents
Academic literature on the topic 'Circulation – Mesures de sécurité – Évaluation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Circulation – Mesures de sécurité – Évaluation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Circulation – Mesures de sécurité – Évaluation"
Toé Guiguemdé, Natacha, Hermine Zimé Diawara, Daniel Dori, and Rasmané Semdé. "Analyse comparée de la réglementation des produits cosmétiques des pays de la CEDEAO par rapport aux pays développés." Journal Africain de Technologie Pharmaceutique et Biopharmacie (JATPB) 1, no. 1 (October 21, 2022): 63–72. http://dx.doi.org/10.57220/jatpb.v1i1.11.
Full textRimmer, Peter J. "Les détroits de Malacca et de Singapour." Études internationales 34, no. 2 (September 30, 2004): 227–53. http://dx.doi.org/10.7202/009173ar.
Full textKlauser, Francisco. "Gestion des circulations aux grands événements sportifs: l’exemple de l’Euro 2008." Géo-Regards 7, no. 1 (2014): 37–54. http://dx.doi.org/10.33055/georegards.2014.007.01.37.
Full textSavage, Andrew. "Le développement de l’employabilité des prestataires de la sécurité du revenu." Nouvelles pratiques sociales 6, no. 2 (January 22, 2008): 125–40. http://dx.doi.org/10.7202/301230ar.
Full textAvodeh, Messanvi, Bayi Reine Dossou, Kouassi Soncy, Mensah Kagni-Dossou, Kokou Anani, Simplice Damintoti Karou, and Yaovi Ameyapoh. "Évaluation du plan de maitrise sanitaire dans les unités de production d’eau en sachet au Togo: cas des villes de Kara et Sokodé." International Journal of Biological and Chemical Sciences 16, no. 2 (July 8, 2022): 812–23. http://dx.doi.org/10.4314/ijbcs.v16i2.24.
Full textChafika, Hebbar, Tires Hachemi, and Hassani Maya Meriem. "Risque routier et securite routiere en Algerie." Territorium, no. 27(I) (January 22, 2020): 133–44. http://dx.doi.org/10.14195/1647-7723_27-1_10.
Full text"Évaluation 85: Colloque international sur l'Évaluation des mesures locales de sécurité routière (international meeting on the evaluation of local traffic safety measures)." Accident Analysis & Prevention 18, no. 2 (April 1986): 180–81. http://dx.doi.org/10.1016/0001-4575(86)90067-9.
Full textWerbin, Kenneth C. "Fear and No-fly Listing in Canada: The Biopolitics of the “War on Terror”." Canadian Journal of Communication 34, no. 4 (August 26, 2009). http://dx.doi.org/10.22230/cjc.2009v34n4a2070.
Full textBagayoko, Thierno Boubacar. "Le préjudice corporel chez les traumatisés de la face admis à l’hôpital Nianankoro Fomba de Ségou." Mali Santé Publique, April 19, 2022, 67–75. http://dx.doi.org/10.53318/msp.v11i2.2189.
Full textLau, Louise, Harkaryn Bagri, Michael Legal, and Karen Dahri. "Comparison of Clinical Importance of Drug Interactions Identified by Hospital Pharmacists and a Local Clinical Decision Support System." Canadian Journal of Hospital Pharmacy 74, no. 3 (July 5, 2021). http://dx.doi.org/10.4212/cjhp.v74i3.3147.
Full textDissertations / Theses on the topic "Circulation – Mesures de sécurité – Évaluation"
Zargouni, Yadh. "Évaluation de l'efficacité des mesures de sécurité routière." Paris 6, 1986. http://www.theses.fr/1986PA066194.
Full textVache, Géraldine. "Evaluation quantitative de la sécurité informatique : approche par les vulnérabilités." Toulouse, INSA, 2009. http://eprint.insa-toulouse.fr/archive/00000356/.
Full textThis thesis presents a new approach for quantitative security evaluation for computer systems. The main objective of this work is to define and evaluate several quantitative measures. These measures are probabilistic and aim at quantifying the environment influence on the computer system security considering vulnerabilities. Initially, we identified the three factors that have a high influence on system state: 1) the vulnerability life cycle, 2) the attacker behaviour and 3) the administrator behaviour. We studied these three factors and their interdependencies and distinguished two main scenarios based on nature of vulnerability discovery, i. E. Malicious or non malicious. This step allowed us to identify the different states of the system considering the vulnerability exploitation process and to define four measures relating to the states of the system: vulnerable, exposed, compromised, patched and secure. To evaluate these measures, we modelled the process of system compromising by vulnerability exploitation. Afterwards, we characterized the vulnerability life cycle events quantitatively, using real data from a vulnerability database, in order to assign realistic values to the parameters of the models. The simulation of these models enabled to obtain the values of the four measures we had defined. Finally, we studied how to extend the modelling to consider several vulnerabilities. So, this approach allows the evaluation of measures quantifying the influences of several factors on the system security
Dacier, Marc. "Vers une évaluation quantitative de la sécurité informatique." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 1994. http://tel.archives-ouvertes.fr/tel-00012022.
Full textLes modèles formels développés pour l'étude de la sécurité informatique, n'offrent pas le cadre mathématique désiré. L'auteur montre qu'ils adoptent une hypothèse de pire cas sur le comportement des utilisateurs, incompatible avec une modélisation réaliste. Après avoir montré, sur la base du modèle take-grant, comment s'affranchir de cette hypothèse, l'auteur définit un nouveau modèle, le graphe des privilèges, plus efficace pour gérer certains problèmes de protection. Il illustre son utilisation dans le cadre des systèmes Unix.
Enfin, l'auteur propose d'évaluer la sécurité en calculant le temps et l'effort nécessaires à un intrus pour violer les objectifs de protection. Il montre comment définir un cadre mathématique apte à représenter le système pour obtenir de telles mesures. Pour cela, le graphe des privilèges est transformé en un réseau de Petri stochastique et son graphe des marquages est dérivé. Les mesures sont calculées sur cette dernière structure et leurs propriétés mathématiques sont démontrées. L'auteur illustre l'utilité du modèle par quelques résultats issus d'un prototype développé afin d'étudier la sécurité opérationnelle d'un système Unix.
Seigneur, Viviane. "La sécurité en haute montagne : penser la sécurité, jugement de fait, jugement de valeur...et autres jugements : approche anthropologique et sociologique." Rouen, 2003. http://www.theses.fr/2003ROUEL448.
Full textThe subject of this thesis is security in high mountain. This work reveals how the security initiatives are built and what the regulation mechanics are. With this aim in view, the research focus on the knowledge which influences on this mechanisms. This knowledge is studied from three points of view. The first one is about the daily life, the second one is about the institutional world and the last one is about the general relationships with risk. Moreover, this research studies the weight of the "non rationals logics" as opposed to "interests logics" (more or less economics) which influence the collective organisation of security. The high mountain is a good illustration with its little economic stakes, a limited scientific knowledge and a very strong mythical potential. The socio-anthropological approach is particularly interesting to identify this different "non rational" dynamisms
Rouzies, Françoise. "La question de la sécurité dans l'aviation civile : la navigation aérienne à l'épreuve de la société du risque." Paris 1, 2009. http://www.theses.fr/2009PA010724.
Full textMacchi, Luigi. "A Resilience Engineering approach for the evaluation of performance variability : development and application of the Functional Resonance Analysis Method for air traffic management safety assessment." Paris, ENMP, 2010. http://pastel.archives-ouvertes.fr/pastel-00589633.
Full textThis thesis demonstrates the need to develop systemic safety assessment methods to account for the effect of performance variability on air traffic management safety. Like most modern socio-technical systems, air traffic management is so complex that it is impossible for it to be completely described. As consequence, performance cannot be completely specified because it must vary to meet performance demands. Performance variability is an inevitable asset to ensure the functioning of an organisation and at the same time can be harmful for system safety when it combines in an unexpected manner. This argument clearly indicates the need for safety assessment methods that can deal with performance variability. The Functional Resonance Analysis Method (FRAM) has the ability to model performance variability. However parts of the FRAM can be improved to expand its capabilities to evaluate performance variability. This thesis addresses this weakness and develops a methodology for the evaluation of performance variability. The methodology has been applied on a safety assessment case study for the German air traffic management domain. The results have been compared with the official results of a traditional safety assessment. The comparison shows the added valued of the proposed methodology. In particular it illustrates the possibility to identify emergent risks and human contribution to system safety
Ouattara, Baba Ouinténi. "Contribution à l'analyse, l'évaluation et la mise en œuvre des nouveaux moyens de contrôle du trafic aérien : application à l'Afrique occidentale." Toulouse 2, 2005. http://www.theses.fr/2005TOU20023.
Full textIn the first part of this study, a state of the art about the current means and methods devoted to Air Traffic Control, specially considering the new navigation systems, is presented. Then the central concept of potential conflict is introduced and characterized geometrically. A probabilistic and a fuzzy logic approach are introduced to evaluate the criticity of a potential conflict. Then the analysis of different proposals to cope with the resolution of conflicts leads to develop a strategic resolution approach which seems more compatible with the on board delegation to solve conflicts. In the last part of this thesis, the consequences of the adoption of a partial delegation within an airspace characterized by a low density traffic with partial radar coverage, are upraised, showing by comparison with the current practice the clear interest for their adoption
Guts, Nataliya. "Auditabilité pour les protocoles de sécurité." Paris 7, 2011. http://www.theses.fr/2011PA077004.
Full textSecurity protocols often log some data available at runtime for an eventual a posteriori analysis, called audit. In practice, audit procedures remain informal, and the choice of log contents is left to the programmer's common sense. The goal of this dissertation is to formalize and verify the properties expected from audit ! logs. First we consider the use of logs in so called optimistic security protocols which, as opposed to classic security protocols, rely on the logs to postpone certain security checks until the end of execution. We formally study two optimistic schemes: value commitment scheme and offline e-cash; using process languages techniques, we prove that the information logged by their implementations suffices to detect the cheat of participants, if any. Then we define auditability as the ability of a protocol to collect enough evidence to convince an audit ! procedure (judge). We propose a method based on types with logical refinements to verify auditability, and ; implement it as an extension to an existing typechecker. We show that verifying auditability boils down to typechecking the protocol implementation. We also implement logical support for generic pre- and post-! conditions to enhance modular typechecking of higher-order functions
Plourde, Guillaume. "Évaluation quantitative de l'exposition à la radiation en cardiologie interventionnelle : approche transradiale et facteurs techniques." Doctoral thesis, Université Laval, 2017. http://hdl.handle.net/20.500.11794/27673.
Full textCoronary artery disease is the leading cause of mortality throughout the world. Percutaneous coronary interventions are increasingly used as diagnostic and therapeutic tools applied to patient care. The use of X-rays is mandatory to perform these procedures. The side effects of radiation exposure are amongst the risks to which patients undergoing a percutaneous coronary intervention are exposed. In order to minimize these risks, one must identify and optimize factors influencing radiation exposure. Amongst them, the radial vascular access site has been inconsistently associated with an increased exposure, even if it is increasingly adopted worldwide as the primary access site. Other factors have also been identified, yet a clinical classification based on their optimization potential by the physician at patient’s bedside remains to be described. The aims of this thesis were identification of technical factors that could be modified at patient’s bedside and formulation of clinical recommendations influencing patient’s radiation exposure. Four independent and complementary projects have been proposed targeting revascularization strategy, catheters number and type, fluoroscopy acquisition rate and vascular access site as potential factors influencing radiation exposure. All studies were lead at Institut universitaire de cardiologie et de pneumologie de Québec. Fluoroscopy time and dose-area product were used as surrogate indicators of radiation exposure. Our results imply that the revascularization strategy did not influence radiation exposure, but that the use of a multiple catheters approach and a 7.5 images per second low-rate fluoroscopy were associated with a reduction of patient’s radiation exposure. Transradial access was associated with a modest increase in radiation exposure when compared with transfemoral access, but the clinical significance of this small increase is uncertain and unlikely to outweigh the clinical benefits of transradial access. In conclusion, identification of technical factors associated with a reduction in radiation exposure enables the formulation of clinical recommendations aiming at risk minimization for the patient and encourages good radiation protection practices.
Gadelrab, Mohammed El-Sayed Gadelrab. "Évaluation des systèmes de détection d'intrusion." Toulouse 3, 2008. http://thesesups.ups-tlse.fr/435/.
Full textThis thesis contributes to the improvement of intrusion detection system (IDS) evaluation. The work is motivated by two problems. First, the observed increase in the number and the complexity of attacks requires that IDSes evolve to stay capable of detecting new attack variations efficiently. Second, the large number of false alarms that are generated by current IDSes renders them ineffective or even useless. Test and evaluation mechanisms are necessary to determine the quality of detection of IDSes or of their detection algorithms. Unfortunately, there is currently no IDS evaluation method that would be unbiased and scientifically rigorous. During our study, we have noticed that current IDS evaluations suffer from three major weaknesses: 1) the lack of a rigorous methodology; 2) the use of non-representative test datasets; and 3) the use of incorrect metrics. From this perspective, we have introduced a rigorous approach covering most aspects of IDS evaluation. In the first place, we propose an evaluation methodology that allows carrying out the evaluation process in a systematic way. Secondly, in order to create representative test datasets, we have characterized attacks by classifying attack activities with respect to IDS-relevant manifestations or features. This allows not only to select attacks that will be included in the evaluation dataset but also to analyze the evaluation result with respect to attack classes rather than individual attack instances. Third, we have analyzed a large number of attack incidents and malware samples, such as viruses and worms. Thanks to this analysis, we built a model for the attack process that exhibits the dynamics of attack activities. This model allows us to generate a large number of realistic and diverse attack scenarios. The proposed methods have been experimented on two very different IDSes to show how general is our approach. The results show that the proposed approach allows overcoming the two main weaknesses of existing evaluations, i. E. , the lack of a rigorous methodology and the use of non-representative datasets. .
Books on the topic "Circulation – Mesures de sécurité – Évaluation"
médicaments, Canada Direction des. Degré d'exposition de la population et évaluation de l'innocuité des médicaments destinés au traitement à long terme d'états ne menaçant pas la vie. Ottawa, Ont: Direction générale de la protection de la santé, Santé Canada, 1995.
Find full textConsultation, d'experts FAO sur la sécurité sanitaire des aliments: science et éthique (2002 Rome Italie). Consultation d'experts FAO sur la sécurité sanitaire des aliments: science et éthique, Rome, Italie, 3-5 septembre 2002. Rome: Organisation des Nations Unies pour l'alimentaire et l'agriculture, 2004.
Find full textCanada, Canada Santé. Rapport d'évaluation des activités de l'Agence canadienne d'inspection des aliments reliées à la salubrité des fruits et des légumes frais importés. Ottawa, Ont: Santé Canada, 2001.
Find full textMcIntyre, Sally. Safety first checklist: Audit & inspection program for children's play areas. 2nd ed. Berkeley, Calif: MIG Communications, 1997.
Find full textCanada, Canada Santé. Rapport d'évaluation des activités de l'Agence canadienne d'inspection des aliments reliées à la salubrité des produits aquicoles. Ottawa, Ont: Santé Canada, 2001.
Find full textMoricière, Guy Gautret de la. Le risque chimique: Concepts, méthodes, pratiques. Paris: Dunod, 2008.
Find full textOlivier, Borraz, and Grandclément-Chaffy Catherine, eds. La sécurité alimentaire en crises: Les crises Coca-Cola et listeria de 1999-2000. Paris: Harmattan, 2004.
Find full textUnited States. Dept. of Transportation. Research and Special Programs Administration. Emergency response guidebook: A guidebook for first responders during the initial phase of a dangerous goods/hazardous materials incident. Washington, D.C: U.S. Dept. of Transportation, Research and Special Programs Administration, 2000.
Find full text