Dissertations / Theses on the topic 'Codes DNS et LES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Codes DNS et LES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Changuel, Samar. "Analyse, optimisation et applications des turbocodes produits Reed-Solomon." Brest, 2008. http://www.theses.fr/2008BRES2012.
Full textThis thesis deals with error correcting codes for digital communications and information storage. It focuses on the study of Turbo codes built from two single-error-correcting Reed-Solomon (RS) component codes and their potential applications. As a first step, we study the distance properties of the binary image of RS codes in order to assess the asymptotic performances under maximum-likelihood soft-decision decoding. We then show that a judicious choice for the code roots may yield binary expansions with larger binary minimum distance and more efficient codes compared to classical constructions. Next, we focus on product codes built from two single-error-correcting RS codes. These codes provide high coding rates and have efficient low-complexity iterative decoding. Computing binary minimum distance of product code and simulations results show that optimizing the binary minimum distance of component codes lied to better asymptotic performances without additional decoder complexity. Afterwards, we compare different hard-decision decoding solutions of RS product codes, otherwise we show that RS Turbo codes are robust to shortening. The third part of this thesis is devoted to the association of products RS turbo codes with high order modulations for bandwidth efficient transmission. We first study the Binary Interleaved Coded Modulation (BICM). We propose then a second pragmatic coded modulation scheme achieving a wide range of spectral efficiency without changing the code and the decoder. Simulation results show that, contrary to the BICM schema, the performance of this solution exhibit a constant gap to the capacity regardless to the dimension of the signal set. Furthermore this gap decreases as we increase the code length. The last part of our work investigates the iterative decoding of product code over erasure channel. We propose two erasure decoding algorithms for linear block codes, and we compare them to other solutions proposed in the literature, with the aim of identifying the well suited algorithm to an iterative decoding of product code. The simulation results show that both RS and BCH product codes provide near-capacity performances on erasure channel
Devolder-Muchembled, Jeanne. "Codes, mots infinis et bi-infinis." Lille 1, 1993. http://www.theses.fr/1993LIL10075.
Full textAugot, Daniel. "Décodage des codes algébriques et cryptographie." Habilitation à diriger des recherches, Université Pierre et Marie Curie - Paris VI, 2007. http://tel.archives-ouvertes.fr/tel-00159149.
Full textles codes cycliques binaires et les codes de Reed-Solomon sur un
alphabet $q$-aire (ainsi que les codes géométriques). En ce qui
concerne les codes cycliques, ceux-ci n'ont pas d'algorithme générique
de décodage, mis à part les codes BCH ou assimilés (bornes de
Hartman-Tzeng, de Roos). Au premier rang des codes intéressants pour
lesquels on ne connaît pas d'algorithme de décodage {\em générique}
figurent les {\em codes à résidus quadratiques}, qui ont de bons
paramètres. J'étudie une mise en équation du problème du décodage par
syndrôme de ces codes, que l'on peut résoudre avec des outils de base
de Gröbner. On obtient ainsi des algorithmes de décodage de complexité
raisonnable pour ces codes. Ces travaux ont fait l'objet d'une partie
de la thèse de Magali Bardet.
En ce qui concerne les codes de Reed-Solomon, ceux-ci peuvent être vus
comme des {\em codes d'évaluation}, et le problème de décodage associé
revient à approcher une fonction par des polynômes de base degré. De
grands progrès ont été réalisés par Guruswami et Sudan, qui ont trouvé
un algorithme qui décode bien au delà des rayons classiques de
décodage, en relaxant l'hypothèse que la solution doit être unique. Je
propose d'améliorer certaines étapes de cet algorithme, en le rendant
plus rapide et déterministe (notamment en évitant une factorisation de
polynôme sur un corps fini), dans le cas des codes Reed-Solomon, et
dans le cas des codes géométriques. Ces travaux ont été effectués en
encadrant Lancelot Pecquet.
Du point de vue théorique, j'ai étudié des généralisations
multivariées, qui correspondent à certains codes: les codes produits
de Reed-Solomon, et les codes de Reed-Muller. On obtient ainsi un bon
rayon de décodage, dans le cas des codes de petit taux. Dans le cas de
codes de Reed-Muller sur l'alphabet binaire, Cédric Tavernier, dans sa
thèse sous ma direction, a produit et implanté un algorithme efficace,
plus que ceux basés sur l'algorithme de Guruswami-Sudan.
J'ai étudié les aspects négatifs du problème de décodage par syndrôme
des codes linéaires, et du décodage des codes de Reed-Solomon, quand
le nombre d'erreurs est élevé, en but d'application en cryptographie.
Dans le premier cas, j'ai construit une fonction de hachage
cryptographique à réduction de sécurité, c'est-à-dire que trouver une
faiblesse dans le fonction de hachage revient à résoudre un problème
réputé difficile de codage. J'ai aussi construit une nouvelle
primitive de chiffrement à clé publique, reposant sur la difficulté de
décoder les codes de Reed-Solomon.
Dans un domaine plus appliqué, j'ai proposé avec Raghav Bhaskar un
nouvel algorithme d'échange de clé multi-utilisateurs, fondé sur le
problème du logarithme discret. Raghav Bhaskar a fourni une preuve de
sécurité de ce protocole, pendant sa thèse sous ma direction. Nous
avons aussi étudié comment adapter ce protocole aux pertes de
messages, car notre protocole est un des seuls qui est robuste à ces
pertes.
Levy-Dit-Vehel, Françoise. "Divisibilité des codes cycliques : applications et prolongements." Paris 6, 1994. http://www.theses.fr/1994PA066631.
Full textVauterin, Thomas. "Codes littéraires et codes sociaux dans la titrologie du roman québécois au XXe siècle." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq26369.pdf.
Full textWafo. "Demultiplication des codes et correction des paquets d'erreurs." Toulon, 1993. http://www.theses.fr/1993TOUL0005.
Full textCoupechoux, Pierre. "Codes et jeux de soustraction et de poursuite dans les graphes." Thesis, Toulouse, INSA, 2018. http://www.theses.fr/2018ISAT0016/document.
Full textIdentifying codes were introduced in 1998 by Karpovsky, Chakrabarty and Levitin. An identifying code is a subgraph such that each vertex is uniquely identified by the vertices in its neighborhood. There are several variants of these codes, including a colored version where the vertices are identified by the colors in their neighborhood. In this phd, we want to build an identifying coloring of a large cycle, given a fixed number of colors. We also studied identified codes in a certain class of oriented graphs: tournaments. We have also studied some topics in the game theory. The first one is a generalization of octal games, where we play on a graph instead of a heap. More precisely, the 0.33 game; each player can remove one or two vertices in a graph, with no disconnection allowed. The first player who cannot play loses. We studied this game in some graph classes: subdivided stars and subdivided bistars. The other game is called the Firefighter game. It's a one player game, where this one wants to contain a spreading fire in a graph. We solved a conjecture about this game, and introduced the online version of the game, for which we found some approximation results
Foucaud, Florent. "Aspects combinatoires et algorithmiques des codes identifiants dans les graphes." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2012. http://tel.archives-ouvertes.fr/tel-00766138.
Full textFerrand, Ludovic. "Codes orthographiques et phonologiques dans la perception des mots écrits." Paris, EHESS, 1994. http://www.theses.fr/1994EHES0313.
Full textThis thesis provides theoritical and experimental evidence in favour of the role of phonological information in visual word recognition. Using the masked priming paradigm, we demonstrate experimentally that both orthographic and phonological information play a fundamental role in the process of visual word recognition and that lexical representations can be accessed on the basis of both types of code. Finally, we present a general model of visual word recognition in which we assume that both phonological and orthographic codes are activated in parallel and influence conjointly the process of visual word recognition
Dieni, Edoardo. "Conception 'juscorporaliste' et divorce dans le droit matrimonial canonique l'idee de conjugalite chez les codificateurs de 1917 et ses ascendences." Paris 11, 1997. http://www.theses.fr/1997PA111011.
Full textThe work wishes to offfer a critical approach to the canonistic idea of marriage, as resulting, at present, by the code of canon law (or by his mainstream interpretation). This idea consideres, in conclusion, spiritual partnership after divorce not infringe the principle of indissolubility. Thus, the study investigates some of the cultural origins of such idea, regarding especially the classic age of canon law - that fixed the long-lived outline of marriage - and the re-formulation of canonical discipline at times of compiling 1917 code of canon law - when the traditional conception was radicalised (the research concentrates on the unpublished documents of vatican secret archives). Subscribing to this historical point of view, it seems that many of contemporary questions on marriage must be considered in the light of the status of christian life; neverthless, the relation clergy-laic in the roman church is turned problematical and precarious after the second vatican council. Waiting for further development in the field of the theology and of the constitutional structure of the church, the study suggests an interim canonistic solution for the case of catholics divorced and remarried
Yu, Zerong. "Analyse et performance des codes convolutionnels récursifs systématiques." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0030/MQ38716.pdf.
Full textBonnecaze, Alexis. "Codes sur des anneaux finis et reseaux arithmetiques." Nice, 1995. http://www.theses.fr/1995NICE4905.
Full textArbach, Nadia. "La transgression des codes, le travestissement, l' honneste amitie et le code social dans "L'Astree" d'Honore d'Urfe." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ52969.pdf.
Full textFerard, Eric. "Poids des duaux des codes BCH et sommes exponentielles." Aix-Marseille 2, 2000. http://www.theses.fr/2000AIX22084.
Full textMartin, Matthias. "L'annotation des codes, étude et comparaison en droits français et monégasque." Thesis, Université de Lorraine, 2013. http://www.theses.fr/2013LORR0352/document.
Full textCode Annotation is an unknown notion in French Law, although the majority of published codes have it. Toanalyze its nature and functions is consequently not devoid of interest. The use of the comparative approach isessential here. Code Annotation is better understood through comparison with code standards devoid ofAnnotation – those of the Principality of Monaco.Code Annotation is any difference, by addition or deletion, compared to the official text of the code, which addsvalue to its interpretation. It is the production of one or several annotators, who express their conceptions of theLaw, and thus it participates to the construction of Legal Doctrine. Annotation constitutes the combination oflegal texts and jurisprudential contributions, resulting in a complete presentation of the Law. Such observationscan be made in French as well as in Monegasque Law, even if the latter is characterized by national legalspecificities which restrict the current development of Annotation.By presenting all the law in force in the same place, Annotation enables codification to renovate itself and beadapted to the present time. The interaction between Annotation and its basis makes it possible to consider thatAnnotation is a third way of codification, without legal force. Therefore, any code which is not annotated shouldbe considered an unfinished code.That is why it could be appropriate for Monegasque codes to be fully annotated in the near future
El, Amrani Nora. "Codes additifs et matrices MDS pour la cryptographie." Thesis, Limoges, 2016. http://www.theses.fr/2016LIMO0034/document.
Full textThis PhD focuses on the links between error correcting codes and diffusion matrices used in cryptography symmetric. The goal is to study the possible construction of additives MDS codes defined over the group (Fm2, +) of binary m-tuples and minimize cost of hardware or software implementation of these diffusion matrices. This thesis begins with the study of codes defined over the polynomial ring F[x]/f(x), these codes are a generalization of quasi-cyclic codes, and continues with the study of additive systematic codes over (Fm2, +) and there relation with linear diffusion on symmetric cryptography. An important point of this thesis is the introduction of codes with coefficients in the ring of endomorphisms of Fm2. The link between codes which are a left-submodules and additive codes have been identified. The last part focuses on the study and construction of efficient diffusion MDS matrices for the cryptographic applications, namely the circulantes matrices, dyadic matrices, and matrices with hollow representation, in ordre to minimize their implementations
Dragoi, Vlad Florin. "Approche algébrique pour l'étude et la résolution de problèmes algorithmiques issus de la cryptographie et la théorie des codes." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMR046/document.
Full textFirst of all, during my PhD I focused on the public key cryptography, more exactly on the code-based cryptography. The main motivation is to study the security of the latest encryption schemes. For that, I analyzed in detail the structural properties of the main code families. Thus, my research was naturally directed to the study of the McEliece based encryption schemes, among which the latest MDCP based variant [MTSB13] and Polar codes variant [SK14]. In the case of the MDPC based variant, we manage to reveal an important weakness regarding the key pairs that are used in the protocol. Indeed, we proposed an efficient algorithm that retrieves the private key given the public key of the scheme. Next we counted the proportion of weak keys and we used the code equivalence problem to extend the number of weak keys. We published our results in an international conference in cryptography [BDLO16]. Next we studied the Polar codes and their application to public key cryptography.Since they were discovered by Arikan [Arı09], Polar codes are part of the most studied from an information theory point of view, family of codes. In terms of performance they are really efficient since they are capacity achieving over the Binary Discrete Memoryless Channels and they allow extremely fast encoding and decoding algorithms. Nonetheless, few facts are known about their structure. In this context, we have introduced an algebraic formalism which allowed us to reveal a big part of the structure of Polar codes. Indeed, we have managed to answer fundamental questions regarding Polar codes such as the dual, the minimum distance, the permutation group and the number of minimum weight codewords of a Polar code. Our results were published in an international conference in information theory [BDOT16]. We also managed to completely cryptanalyze the McEliece variant using Polar codes. The attack was a direct application of the aforementioned results on the structural properties of Polar codes and it was published in an international conference in postquantum cryptography [BCD+16]
Filiol, Éric. "Techniques de reconstruction en cryptologie et theorie des codes." Palaiseau, Ecole polytechnique, 2001. http://www.theses.fr/2001EPXX0005.
Full textLalam, Massinissa. "Optimisation de la concaténation de codes spatio-temporels et de codes correcteurs d'erreurs dans une transmission MIMO." Télécom Bretagne, 2006. http://www.theses.fr/2006TELB0022.
Full textMihoubi, Cherif. "Trinômes irréductibles sur F2 et codes cycliques ternaires de rendements 1/2." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0084/document.
Full textConsidering polynomials over the Galois finite fields for two elements, our intention stand over the divisibility of the trinomials x^am+x^bs+1, for m>s ≥ 1, by an irreducible polynomial of degree r, for this, we contribute to the result :If there exist positive integers m, s such that the trinomial x^am+x^bs+1 is divisible by an irreducible polynomial of degree r over F2, then a and b are not divisible by (2^r- 1). For this type of trinomials we conjectured that the ratios πM(a,b)/ πM(1,1) tend to a finite limit (dependently of a and b) when M tend to infinity. Our research stand at sequel on the cyclic codes of rate 1/2 over the two finite fields F3 and F5 and we check our research over whose are isodual. The so-called fundamental problem in coding theory is finding the largest value of dq for which a code of parameters [n, q, d] over Fq exists. In this context we have successfully optimize this distance for the cyclic codes of rate 1/2 over F3 and F5 up to length 74 for the ternary cyclic codes and 42 for whose over F5. We have also successful to construct seven classes of isodual cyclic codes over the field of 3 elements and three classes over the field of 5 elements
Frey, Gabriel. "Codes circulaires dans les gènes : Evolution et fonction possible." Strasbourg 1, 2005. https://publication-theses.unistra.fr/public/theses_doctorat/2005/FREY_Gabriel_2005.pdf.
Full textDolce, Francesco. "Codes bifixes, combinatoire des mots et systèmes dynamiques symboliques." Thesis, Paris Est, 2016. http://www.theses.fr/2016PESC1036/document.
Full textSets of words of linear complexity play an important role in combinatorics on words and symbolic dynamics.This family of sets includes set of factors of Sturmian and Arnoux-Rauzy words, interval exchange sets and primitive morphic sets, that is, sets of factors of fixed points of primitive morphisms.The leading issue of this thesis is the study of minimal dynamical systems, also defined equivalently as uniformly recurrent sets of words.As a main result, we consider a natural hierarchy of minimal systems containing neutral sets, tree sets and specular sets.Moreover, we connect the minimal systems to the free group using the notions of return words and basis of subroups of finite index.Symbolic dynamical systems arising from interval exchanges and linear involutions provide us geometrical examples of this kind of sets.One of the main tool used here is the study of possible extensions of a word in a set, that allows us to determine properties such as the factor complexity.In this manuscript we define the extension graph, an undirected graph associated to each word $w$ in a set $S$ which describes the possible extensions of $w$ in $S$ on the left and the right.In this thesis we present several classes of sets of words defined by the possible shapes that the graphs of elements in the set can have.One of the weakest condition that we will study is the neutrality condition: a word $w$ is neutral if the number of pairs $(a, b)$ of letters such that $awb in S$ is equal to the number of letters $a$ such that $aw in S$ plus the number of letters $b$ such that $wb in S$ minus 1.A set such that every nonempty word satisfies the neutrality condition is called a neutral set.A stronger condition is the tree condition: a word $w$ satisfies this condition if its extension graph is both acyclic and connected.A set is called a tree set if any nonempty word satisfies this condition.The family of recurrent tree sets appears as a the natural closure of two known families, namely the Arnoux-Rauzy sets and the interval exchange sets.We also introduce specular sets, a remarkable subfamily of the tree sets.These are subsets of groups which form a natural generalization of free groups.These sets of words are an abstract generalization of the natural codings of interval exchanges and of linear involutions.For each class of sets considered in this thesis, we prove several results concerning closure properties (under maximal bifix decoding or under taking derived words), cardinality of the bifix codes and set of return words in these sets, connection between return words and basis of the free groups, as well as between bifix codes and subgroup of the free group.Each of these results is proved under the weakest possible assumptions
Kabore, Wendyida Abraham. "Codage de canal et codage réseau pour les CPL-BE dans le contexte des réseaux Smart Grid." Thesis, Limoges, 2016. http://www.theses.fr/2016LIMO0038/document.
Full textThis PhD dissertation deals with the mitigation of the impact of the Narrowband PowerLine communication (NB-PLC) channel impairments e.g., periodic impulsive noise and narrowband noise, by applying the error/erasure correction coding techniques. After an introduction to the concept of smart grid, the NB-PLC channels are characterized precisely and models that describe these channels are presented. The performance of rank metric codes, simple or concatenated with convolutional codes, that are particularly interesting to combat criss-cross errors on the NB-PLC networks are simulated and compared with Reed- Solomon (already present in several NB-PLC standards) codes performance. Fountain codes that can adapt to any channel erasures statistics are used for the NB-PLC networks and the performance of cooperative schemes based on these fountain codes on linear multi-hop networks are studied. Finally, algorithms to combine the network coding and fountain codes for the particular topology of PLC networks for the smart grid are proposed and evaluated
Wen, Erzhuang. "Contribution à l'étude des codes correcteurs et des corps finis." Toulouse 3, 1994. http://www.theses.fr/1994TOU30255.
Full textPICART, ANNIE. "Concatenation de codes et decodage iteratif application des turbo-codes produits aux transmissions a forte efficacite spectrale." Rennes 1, 1998. http://www.theses.fr/1998REN10144.
Full textJacq, Sylvie. "Décodage itératif des codes produits : "turbo-codes en blocs", et évaluations de leurs performances pour des modulations MDP et MAQ sur canal de Gauss et de Rayleigh." Limoges, 1996. http://www.theses.fr/1996LIMO0056.
Full textWitkowska, Alicja. "Estimation numérique du bruit rayonné par une turbulence isotrope." Ecully, Ecole centrale de Lyon, 1994. http://www.theses.fr/1994ECDL0058.
Full textIn 1952 Lighthill showed, using his acoustic analogy, that the acoustic pressure generated by a volume of turbulence can be expressed as a function of the instantaneous velocity field within the volume. The recent advances in computational fluid dynamics and computer technology make it possible to calculate the entire, instantaneous velocity field for simple flows. The purpose of the present study is to use such numerical velocity fields as source terms for Lighthill's analogy in order to predict sound generation. This approach is applied to homogeneous and isotropic turbulence, which was obtained both by Direct Numerical Simulation and Large Eddy Simulation. First, we examine analytically and numerically how Lighthill's analogy can be applied to a finite volume of isotropic turbulence. The sound computations obtained with the Direct Numerical Simulation and the Large Eddy Simulation are in good agreement and fit relatively well with the theoretical predictions of Proudman and Lilley. Finally, the sound generated by stationary, force isotropic turbulence is strudied. Results show that there is a dominant frequency approximately 4 times larger than the inverse eddy turn over time. Furthermore, spectral filtering of the velocity field indicates that the turbulence scales primarly responsible for the generated noise are 2-4 times smaller than energy containing scales
Macoir, Joël. "L'interface entre les codes phonologique, morphologique et orthographique dans l'aphasie." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/nq21856.pdf.
Full textSylla, Mouhamadou Lamine. "Codes turbo, simulation et performances dans le canal radio-mobile." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ38195.pdf.
Full textMacoir, Joël. "L'interface entre les codes phonologique, morphologique et orthographique dans l'aphasie." Sherbrooke : Université de Sherbrooke, 1997.
Find full textRandriananja, Daniel. "Contribution à l'étude des codes convolutionnels et de leurs décodages." Toulouse 3, 1991. http://www.theses.fr/1991TOU30252.
Full textGennero, Marie-Claude. "Contribution à l'étude théorique et appliquée des codes correcteurs d'erreurs." Toulouse 3, 1990. http://www.theses.fr/1990TOU30243.
Full textChandesris, Ludovic. "Contribution à la construction et au décodage des codes polaires." Thesis, Cergy-Pontoise, 2019. http://www.theses.fr/2019CERG1018.
Full textIn a world of intensive and widespread numeric datafow, the use of error correcting codes has become an essential aspect of telecommunication systems, by allowing to compensate the unavoidable alteration of the messages during the transmission, by means of additionnal redundancy to the initial message. Last family of codes to be discovered, in 2008, polar codes have soon experienced a large interest of the community, due to their ability to achieve the Shannon capacity, namely the theoretical limit of the information rate, defned by Shannon in 1948. Very recently, these codes have been adopted in the fifth generation of cellular mobile communications 5G. This thesis concentrates on the analysis of this family of codes regarding constraints of practical systems, including in 5G, through the two major isues of the construction of the code and the decoding in finite length.After reviewing the definition and the caracterisation of polar codes, and addressing the question of the spectrum distance, this thesis considers the issue of the flexibility of the codes as function of the codelength, using either puncturing or shortening techniques, andd escribes a new method to select the pattern so as to minimize the error rate under succssive cancellation decoding (SC). Secondly, a new bit-fipping decoding algorithm is proposed, improving signifcantly the performance compared to state-of-the-art approach,while offering a reduced average complexity, which stays close to the one of the SC decoder. Thirdly, the issue of the use of polar codes with high order modulation is considered. On the one hand, the case of coded modulations, where a high order modulation is combined with binary codes, is considered throughthe bit-interleaved coded modulation and the multilevel coded modulation, and it is shown that the second one is very well suitable for polar codes. On the other hand, the case of non-binary codes, which can be mapped directly to the constellation, are considered and it is revealed they are able to surpass their binary counterpart at the cost of additionnal decoding complexity
Kuitche, Fonkou Gabriel. "Création et circulation des discours codes en milieu Ngémbà / Múngum." Lille 3, 1988. http://www.theses.fr/1988LIL30017.
Full textWhen we decide to take into account the conditions in which oral texts are enonciated, we can approach them as situationnal discourses, in which men are compelled to speak in a certain way. In ngemba area (cameroon western province), we dealed with the following groups of situations : leisure, exaltation, misfortune and contests in eloquence. Discourses of these situations can have common caracteristics, but they differ from each other by the degree of institutionality, the degree of functionality, the topics, the styles, and the degree of vitality. The analisis reveals various topics, numerous discursive forms that can be grouped into a few stylistic families and constitute enriching sources where african writers can go. Number of ngemba discourses figure in current classification of oral texts; but with regard to this classification, some appear like new types. As far as vitality or actuality is concerned, there are almost disparishing types of discourses because they are no longer intensively practised ; types that can only be conserved by the memory because re-creation is almost impossible ; types that can easily be transmitted by playing activities ; types that are very actual because of an intensive practice. For an efficient conservation, registration must be accompanied by practice through school and through cultural structures where productors of discourses may discuss about their productions
Arnaud, Nicolas. "Evaluation dérivée, multiplication dans les corps finis et codes correcteurs." Aix-Marseille 2, 2006. http://theses.univ-amu.fr.lama.univ-amu.fr/2006AIX22020.pdf.
Full textWe present an algorithm of multiplication in finite fields, based on an idea of G. V. And D. V. Chudnovsky. Our improvement is based on the use of derivated evaluations of functions on degree 1 and 2 places. This algorithm allows us to improve known bounds for the bilinear complexity of multiplication in some finite fields. We also present new constructions of correcting codes for the m-metrics, based on the recent work of Xing, Niederreiter, Ozbudak and Elkies on geometric codes. We also adapt a list decoding algorithm following ideas of Sudan in the case of m-metrics
Tonnellier, Thibaud. "Contribution à l’amélioration des performances de décodage des turbo codes : algorithmes et architecture." Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0638/document.
Full textSince their introduction in the 90’s, turbo codes are considered as one of the most powerful error-correcting code. Thanks to their excellent trade-off between computational complexity and decoding performance, they were chosen in many communication standards. One way to characterize error-correcting codes is the evolution of the bit error rate as a function of signal-to-noise ratio (SNR). The turbo code error rate performance is divided in two different regions : the waterfall region and the error floor region. In the waterfall region, a slight increase in SNR results in a significant drop in error rate. In the error floor region, the error rate performance is only slightly improved as the SNR grows. This error floor can prevent turbo codes from being used in applications with low error rates requirements. Therefore various constructions optimizations that lower the error floor of turbo codes has been proposed in recent years by scientific community. However, these approaches can not be considered for already standardized turbo codes.This thesis addresses the problem of lowering the error floor of turbo codes without allowing any modification of the digital communication chain at the transmitter side. For this purpose, the state-of-the-art post-processing decoding method for turbo codes is detailed. It appears that efficient solutions are expensive to implement due to the required multiplication of computational resources or can strongly impact the overall decoding latency. Firstly, two decoding algorithms based on the monitoring of decoder’s internal metrics are proposed. The waterfall region is enhanced by the first algorithm. However, the second one marginally lowers the error floor. Then, the study shows that in the error floor region, frames decoded by the turbo decoder are really close to the word originally transmitted. This is demonstrated by a proposition of an analytical prediction of the distribution of the number of bits in errors per erroneous frame. This prediction rests on the distance spectrum of turbo codes. Since the appearance of error floor region is due to only few bits in errors, an identification metric is proposed. This lead to the proposal of an algorithm that can correct residual errors. This algorithm, called Flip-and-Check, rests on the generation of candidate words, followed by verification according to an error-detecting code. Thanks to this decoding algorithm, the error floor of turbo codes encountered in different standards (LTE, CCSDS, DVB-RCS and DVB-RCS2) is lowered by one order of magnitude. This performance improvement is obtained without considering an important computational complexity overhead. Finally, a hardware decoding architecture implementing the Flip-and-Check algorithm is presented. A preliminary study of the impact of the different parameters of this algorithm is carried out. It leads to the definition of optimal values for some of these parameters. Others has to be adapted according to the gains targeted in terms of decoding performance. The possible integration of this algorithm along with existing turbo decoders is demonstrated thanks to this hardware architecture. This therefore enables the lowering of the error floors of standardized turbo codes
Ben, Maad Hassen. "Optimisation des stratégies de décodage des codes LDPC dans les environnements impulsifs : application aux réseaux de capteurs et ad hoc." Thesis, Reims, 2011. http://www.theses.fr/2011REIMS023/document.
Full textThe goal of this PhD is to study the performance of LDPC codes in an environment where interference, generated by the network, has not a Gaussian nature but presents an impulsive behavior.A rapid study shows that, if we do not take care, the codes’ performance significantly degrades.In a first step, we study different approaches for impulsive noise modeling. In the case of multiple access interference that disturb communications in ad hoc or sensor networks, the choice of alpha-stable distributions is appropriate. They generalize Gaussian distributions, are stable by convolution and can be theoretically justified in several contexts.We then determine the capacity if the α-stable environment and show using an asymptotic method that LDPC codes in such an environment are efficient but that a simple linear operation on the received samples at the decoder input does not allow to obtain the expected good performance. Consequently we propose several methods to obtain the likelihood ratio necessary at the decoder input. The optimal solution is highly complex to implement. We have studied several other approaches and especially the clipping for which we proposed several approaches to determine the optimal parameters
Henocq, Thierry. "Jacobienne et fonction Zeta des courbes algébriques. Décodage des codes géométriques." Toulouse 3, 1994. http://www.theses.fr/1994TOU30185.
Full textPons, Sandrine. "Des codes de loi et des codes du genre : hommes et femmes poursuivi·e·s pour homicide devant la cour d’assises de la Haute-Garonne (1864-1914)." Thesis, Toulouse 2, 2018. http://www.theses.fr/2018TOU20111.
Full textThe Criminal Code of 1810 was neutral neither in its principles nor in its implementation. Gender goes througt the wole judicial process. In Haute-Garonne, between 1864 and 1914, those accused of intentional homicide (murder, assassination, infanticide,parricide, poisoning and attempts to commit these crimes) were subjected to the test of a net that mainly retained in its mesh men and women from the working classes. The most privileged were less vulnerable to justice. Men were more expected and wanted for the blood crimes, except for infanticides, for which mothers were almost exclusively suspected. This distribution of accused persons is partly the result of gender stereotypes, based in particular on the naturalizing science of the time. In the 19th century, the individualisation of sentences encouraged the judgment of persons (more than crimes), but the criteria for assessing reputation and morals which influenced the verdicts handed down, the requisitions set out by the Advocate General, and the defence strategies of lawyers differed according to the sex of the accused. The lexicon, used by court reporters (who reported on trials for their journals), investigating judges and prosecutors, is also gendered. To talk about morality or sexuality is to assign differentiated roles to men and women, and to presume a gendered hierarchy. By putting violence into words, magistrates built a gratuated scale of value from acceptable to intolerable and often mitigated violence by women. By denouncing the brutality of certain criminals from the working class, they defended another conception of masculinity, based on mediation and the verb
OUEDERNI, MAROUANE. "Modelisation et simulation des regulations dans les codes de calcul thermique du batiment." Paris, ENMP, 1990. http://www.theses.fr/1990ENMP0236.
Full textAbadi, Amir Hossein. "L'équilibre économique dans le contrat : étude comparative des codes civils français et iranien." Bordeaux 4, 1995. http://www.theses.fr/1995BOR40019.
Full textIn a commutative contract, for the execution of the contracting parties, obligation to be possible, chere must be a balance between prestations. Each contracting party must receive the equivalent of the services. If the conventional justice is not protected by law, one of the contracting party will exploit the other, which then is unable to defend its interest either by weakness or ignorance or necessity
Zongo, Bernard. "Stratégies de communication et individuation sociolinguistique chez les étudiants burkinabé à Ouagadougou et à Paris." Rouen, 1993. http://www.theses.fr/1993ROUEL170.
Full textThe bilingual has, in his linguistic repertoire, means of communication that enable him or her to adapt his or her language to more various situations of communication than the ones of monolingual people. Among these means, we dealt especially with code-switching switching both french and moore, french and slang - in two migrant bilingual linguistic communities that we studied in two different ways. According to the ethnographic theory of Hymes, we tried to show that code-switching is a mean of structuration of communication strategies. Two bilingual persons who are communicating can thanks to their linguistic choices either exclude or integrate a monolingual person in the communication space. According to the theory of individuation of Marcellesi Gardin, code-switching has been analysed as language activity through which a bilingual linguistic community tries to be different from others
Josse, Sébastien. "Analyse et détection dynamique de codes viraux dans un contexte cryptographique." Phd thesis, Ecole Polytechnique X, 2009. http://pastel.archives-ouvertes.fr/pastel-00005279.
Full textZhou, Rong. "Etude des Turbo codes en blocs Reed-Solomon et leurs applications." Rennes 1, 2005. http://www.theses.fr/2005REN1S027.
Full textThai, Quynh Phong. "Analyse numérique des méthodes d'optimisation globale. Codes et simulations numériques. Applications." Rouen, 1994. http://www.theses.fr/1994ROUES069.
Full textPlanquette, Guillaume. "Étude de certaines propriétés algébriques et spectrales des codes correcteurs d'erreurs." Rennes 1, 1996. http://www.theses.fr/1996REN10207.
Full textZafar, Nessar. "Codes et politiques des investissements dans les pays en voie de développement : observations générales et recherches comparées." Paris 2, 1996. http://www.theses.fr/1996PA020121.
Full textMany substantials advantages as well from the fiscal point of view as extrafiscal, offered by the investment law of the developing countries, the incitation and garantee measures adopted by the investors countries and in the context of international agreements have favoured an important flow of foreign investments in the developing countries. Nevertheless, foreign investment flow could not be enough to incite economic growth and bringing technical progress in the countries where the investment evolution is often thwarted by political, economical and social environment, hostile to technical progress and private initiative. In developing countries, the state is major player and must grade needs, make institutional, economic, tax and social reforms in order to create an optimum, safe, stable and welcoming environment, more over set up structures and implement enough means involving on the one hand accumulation of national savings and their orientation to production activities as to develop national industrie, on the other hand promote and oriente foreign investment to the economic sectors or to the areas where capital, technology, know-how, managment capacity are missing
Yazbek, Abdul Karim. "Les codes à métrique de rang et leurs applications dans les réseaux Smart Grid." Thesis, Limoges, 2017. http://www.theses.fr/2017LIMO0091/document.
Full textThis thesis considers the context of transmissions on CPL-BE networks and low-capacity sensor networks. The state of the art on information protection intransmission by sensor networks refers to the use of distributed coding, where therelays implement parity operations (mixing of streams) on data transmitted by thesensors. However, due to the varying nature of the quality of the wireless links, it is difficult to control the quality of the equivalent encoder constructed and to maintain its performance over time. Therefore, in this thesis, we have focused on the search for different coding schemes that are better resist the variation in the quality of the links across the network. Our choice was based on the sub-space coding inspired by Gabidulin's work. The goal is to form a code that uses a simple and resistant metric to secure transmission across the network. Rank metric codes respond well to this need because it only has to control the rank of the matrix obtained in reception to verify the integrity of the transmission. The rank metric codes and their decoding algorithm were studied in a first step. Then, the performance of the proposed LRPC code concatenated with the convolutional codes is tested in transmission schemes of different contexts
Lasserre, Valérie. "La technique législative : étude sur les codes civils français et allemand." Paris 2, 2000. http://www.theses.fr/2000PA020058.
Full textAhmed, Ahmed. "Identification et analyse des signaux de codes circulaires dans les gènes par des méthodes bioinformatiques." Strasbourg, 2010. http://www.theses.fr/2010STRA6001.
Full textA previous study of the structure of nucleotides in the 3 frames of genes has shown that the trinucleotide distribution in the 3 frames is not random and that each trinucleotide occurs preferentially in one of the 3 frames. Hence, 3 sets of trinucleotides have been identified representing the trinucleotides with a preferential frame 0, 1 or 2. Those 3 sets have shown exceptional bio-mathematical properties, in particular the circular code property which allows identifying automatically the 3 frames locally in a gene without knowledge of the start codon. Those sets are called the common circular code. The objective of our thesis is to identify and analyze signals of the common circular code in different gene families. Those gene families are chosen because either their primary structures or their biological functions have a link with one of the common circular code properties. By using the circular code information, a list of the essential cellular functions has been studied and identified in a species independent manner. This study has also allowed studying the common circular code evolution and stability. The common circular code has also been studied in 2 special gene families: the micro RNAs and the frameshift genes. This study allowed the identification of new structural properties that led to a better identification of those genes