Dissertations / Theses on the topic 'Systèmes fog'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Systèmes fog.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Full textThe Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
Ozeer, Umar Ibn Zaid. "Autonomic resilience of distributed IoT applications in the Fog." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM054.
Full textRecent computing trends have been advocating for more distributed paradigms, namelyFog computing, which extends the capacities of the Cloud at the edge of the network, thatis close to end devices and end users in the physical world. The Fog is a key enabler of theInternet of Things (IoT) applications as it resolves some of the needs that the Cloud failsto provide such as low network latencies, privacy, QoS, and geographical requirements. Forthis reason, the Fog has become increasingly popular and finds application in many fieldssuch as smart homes and cities, agriculture, healthcare, transportation, etc.The Fog, however, is unstable because it is constituted of billions of heterogeneous devicesin a dynamic ecosystem. IoT devices may regularly fail because of bulk production andcheap design. Moreover, the Fog-IoT ecosystem is cyber-physical and thus devices aresubjected to external physical world conditions which increase the occurrence of failures.When failures occur in such an ecosystem, the resulting inconsistencies in the applicationaffect the physical world by inducing hazardous and costly situations.In this Thesis, we propose an end-to-end autonomic failure management approach for IoTapplications deployed in the Fog. The approach manages IoT applications and is composedof four functional steps: (i) state saving, (ii) monitoring, (iii) failure notification,and (iv) recovery. Each step is a collection of similar roles and is implemented, taking intoaccount the specificities of the ecosystem (e.g., heterogeneity, resource limitations). Statesaving aims at saving data concerning the state of the managed application. These includeruntime parameters and the data in the volatile memory, as well as messages exchangedand functions executed by the application. Monitoring aims at observing and reportinginformation on the lifecycle of the application. When a failure is detected, failure notificationsare propagated to the part of the application which is affected by that failure.The propagation of failure notifications aims at limiting the impact of the failure and providinga partial service. In order to recover from a failure, the application is reconfigured and thedata saved during the state saving step are used to restore a cyber-physical consistent stateof the application. Cyber-physical consistency aims at maintaining a consistent behaviourof the application with respect to the physical world, as well as avoiding dangerous andcostly circumstances.The approach was validated using model checking techniques to verify important correctnessproperties. It was then implemented as a framework called F3ARIoT. This frameworkwas evaluated on a smart home application. The results showed the feasibility of deployingF3ARIoT on real Fog-IoT applications as well as its good performances in regards to enduser experience
Manzalini, Antonio. "An operating system for 5G Edge Clouds." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0013.
Full textTechnology and socio-economic drivers are creating the conditions for a profound transformation, called “Softwarization”, of the Telco and ICT. Software-Defined Networks and Network Functions Virtualization are two of the key enabling technologies paving the way towards this transformation. Softwarization will allow to virtualize all network and services functions of a Telco infrastructure and executing them onto a software platforms, fully decoupled from the underneath physical infrastructure (almost based on standard hardware). Any services will be provided by using a “continuum” of virtual resources (processing, storage and communications) with practically very limited upfront capital investment and with modest operating costs. 5G will be the first exploitation of Softwarization. 5G will be a massively dense distributed infrastructure, integrating processing, storage and (fixed and radio) networking capabilities. In summary, the overall goal of this thesis has been investigating technical challenges and business opportunities brought by the “Softwarization” and 5G. In particular, the thesis proposes that the 5G will have to have a sort of Operating System (5GOS) capable of operating the converged fixed and RAN and core infrastructures. Main contributions of this thesis have been: 1) defining a vision for future 5G infrastructures, scenarios, use-cases and main requirements; 2) defining the functional architecture of an Operating System for 5G; 3) designing the software architecture of a 5G OS for the “Edge Cloud”; 4) understanding the techno-economic impacts of the vision and 5GOS, and the most effective strategies to exploit it
Awad, Hiba. "Quality of service assurance before deployment of fog systems with model-based engineering and DevOps." Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2025. http://www.theses.fr/2025IMTA0468.
Full textFog Computing decentralizes the Cloud by bringing computation, storage, and network services closer to the edge. This reduces latency and bandwidth usage while improving real-time processing. However, the complexity and heterogeneity of Fog systems, often comprising diverse entities, make lifecycle management challenging and costly. Runtime error handling frequently requires revisiting earlier phases, which is both timeconsuming and expensive. Ensuring reliability through pre-deployment verification is therefore essential. Fog systems are deployed in domains such as healthcare, automotive, and smart cities, further complicating verification and deployment processes. To address these challenges, we propose a generic and customizable approach based on a two-step verification process. This approach focuses on the design-time and pre-deployment phases, automating key verification and deployment activities. Our solution features a customizable Fog modeling language, design-time verification of non-functional properties (e.g., security, energy), preparation of pre-deployment configurations, and integration with industrial DevOps tools and Quality of Service (QoS) solutions. By combining Model-Based Engineering and DevOps practices, our approach ensures QoS, reduces deployment costs, and enhances automation to tackle the complexity of Fog systems. We validated this approach using three literature-based use cases—smart campus, smart parking, and smart hospital. Results demonstrate its effectiveness in QoS verification, deployment automation, and reducing complexity and costs, highlighting its relevance to state-of-the-art engineering and DevOps practices
Manzalini, Antonio. "An operating system for 5G Edge Clouds." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0013.
Full textTechnology and socio-economic drivers are creating the conditions for a profound transformation, called “Softwarization”, of the Telco and ICT. Software-Defined Networks and Network Functions Virtualization are two of the key enabling technologies paving the way towards this transformation. Softwarization will allow to virtualize all network and services functions of a Telco infrastructure and executing them onto a software platforms, fully decoupled from the underneath physical infrastructure (almost based on standard hardware). Any services will be provided by using a “continuum” of virtual resources (processing, storage and communications) with practically very limited upfront capital investment and with modest operating costs. 5G will be the first exploitation of Softwarization. 5G will be a massively dense distributed infrastructure, integrating processing, storage and (fixed and radio) networking capabilities. In summary, the overall goal of this thesis has been investigating technical challenges and business opportunities brought by the “Softwarization” and 5G. In particular, the thesis proposes that the 5G will have to have a sort of Operating System (5GOS) capable of operating the converged fixed and RAN and core infrastructures. Main contributions of this thesis have been: 1) defining a vision for future 5G infrastructures, scenarios, use-cases and main requirements; 2) defining the functional architecture of an Operating System for 5G; 3) designing the software architecture of a 5G OS for the “Edge Cloud”; 4) understanding the techno-economic impacts of the vision and 5GOS, and the most effective strategies to exploit it
Duthon, Pierre. "Descripteurs d'images pour les systèmes de vision routiers en situations atmosphériques dégradées et caractérisation des hydrométéores." Thesis, Université Clermont Auvergne (2017-2020), 2017. http://www.theses.fr/2017CLFAC065/document.
Full textComputer vision systems are increasingly being used on roads. They can be installed along infrastructure for traffic monitoring purposes. When mounted in vehicles, they perform driver assistance functions. In both cases, computer vision systems enhance road safety and streamline travel.A literature review starts by retracing the introduction and rollout of computer vision algorithms in road environments, and goes on to demonstrate the importance of image descriptors in the processing chains implemented in such algorithms. It continues with a review of image descriptors from a novel approach, considering them in parallel with final applications, which opens up numerous analytical angles. Finally the literature review makes it possible to assess which descriptors are the most representative in road environments.Several databases containing images and associated meteorological data (e.g. rain, fog) are then presented. These databases are completely original because image acquisition and weather condition measurement are at the same location and the same time. Moreover, calibrated meteorological sensors are used. Each database contains different scenes (e.g. black and white target, pedestrian) and different kind of weather (i.e. rain, fog, daytime, night-time). Databases contain digitally simulated, artificial and natural weather conditions.Seven of the most representative image descriptors in road context are then selected and their robustness in rainy conditions is evaluated. Image descriptors based on pixel intensity and those that use vertical edges are sensitive to rainy conditions. Conversely, the Harris feature and features that combine different edge orientations remain robust for rainfall rates ranging in 0 – 30 mm/h. The robustness of image features in rainy conditions decreases as the rainfall rate increases. Finally, the image descriptors most sensitive to rain have potential for use in a camera-based rain classification application.The image descriptor behaviour in adverse weather conditions is not necessarily related to the associated final function one. Thus, two pedestrian detectors were assessed in degraded weather conditions (rain, fog, daytime, night-time). Night-time and fog are the conditions that have the greatest impact on pedestrian detection. The methodology developed and associated database could be reused to assess others final functions (e.g. vehicle detection, traffic sign detection).In road environments, real-time knowledge of local weather conditions is an essential prerequisite for addressing the twin challenges of enhancing road safety and streamlining travel. Currently, the only mean of quantifying weather conditions along a road network requires the installation of meteorological stations. Such stations are costly and must be maintained; however, large numbers of cameras are already installed on the roadside. A new method that uses road traffic cameras to detect weather conditions has therefore been proposed. This method uses a combination of a neural network and image descriptors applied to image patches. It addresses a clearly defined set of constraints relating to the ability to operate in real-time and to classify the full spectrum of meteorological conditions and grades them according to their intensity. The method differentiates between normal daytime, rain, fog and normal night-time weather conditions. After several optimisation steps, the proposed method obtains better results than the ones reported in the literature for comparable algorithms
Darrous, Jad. "Scalable and Efficient Data Management in Distributed Clouds : Service Provisioning and Data Processing." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEN077.
Full textThis thesis focuses on scalable data management solutions to accelerate service provisioning and enable efficient execution of data-intensive applications in large-scale distributed clouds. Data-intensive applications are increasingly running on distributed infrastructures (multiple clusters). The main two reasons for such a trend are 1) moving computation to data sources can eliminate the latency of data transmission, and 2) storing data on one site may not be feasible given the continuous increase of data size.On the one hand, most applications run on virtual clusters to provide isolated services, and require virtual machine images (VMIs) or container images to provision such services. Hence, it is important to enable fast provisioning of virtualization services to reduce the waiting time of new running services or applications. Different from previous work, during the first part of this thesis, we worked on optimizing data retrieval and placement considering challenging issues including the continuous increase of the number and size of VMIs and container images, and the limited bandwidth and heterogeneity of the wide area network (WAN) connections.On the other hand, data-intensive applications rely on replication to provide dependable and fast services, but it became expensive and even infeasible with the unprecedented growth of data size. The second part of this thesis provides one of the first studies on understanding and improving the performance of data-intensive applications when replacing replication with the storage-efficient erasure coding (EC) technique
Koubeissi, Ahmad. "Methodology for unified modeling of system of systems of engineering." Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10143/document.
Full textThe main focus of this thesis is on multilevel graphical modeling of behavior and organization of a set of component systems in a System of Systems concept. In the present work, we model the wireless communication link among component systems, with all its major effects, using a graphical modeling tool for describing flow of power in multi-physics domain called Bond Graph. This model permits identifying mathematically, the quality of signal received at information sink based on model parameter values. We conduct an experiment on cooperative behavior of two humanoids in a system of systems concept and demonstrate how we are able to experimentally measure the parameter values defined in our model.Next we justify how we are able to evaluate quantitatively, the fault tolerance level of a wireless communication link and introduce the need for redundant links in system of systems. Then we propose a methodology for coupling Hyper Graph, used for modeling the organization of component systems, and Bond Graph in multilevel graphical modeling of system of systems. Finally, we discuss another system of systems with two cooperating component systems, a Unmanned Aerial Vehicle (UAV) and an intelligent autonomous vehicle (robuTAINer), in which the UAV will supply navigation information to the intelligent autonomous vehicle to be able to safely maneuver in a confined space. We develop algorithms for robuTAINer detection and navigation from UAV. Then we practically test our algorithms and analyze the obtained results
Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Full textThese last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Bouziat, Teddy. "A Cooperative Architecting Procedure for Systems of Systems Based on Self-Adaptive Multi-Agent Systems." Thesis, Toulouse 1, 2017. http://www.theses.fr/2017TOU10069.
Full textSince the World War II, researchers have tended to develop methodologies and tools tobuild and control the development of more and more complex systems and projects. Thisinter-disciplinary research area has been called Systems Engineering (SE) and continues tobe developed nowadays. In 1990, the fall of USSR led the US Department of Defense (DoD)to re-think its defense doctrine and to switch from a one opponent confrontation to a globalizationof conflicts with a huge variety of scenarios. Its idea was to re-use and join itsdefense systems by producing a huge, decentralized and adaptive defense system that iscomposed of existing and independents (complex) systems. This is the apparition of theSystem of Systems (SoS) concept. After 2000’s, this concept spreads in civil domains suchas crisis management or logistic systems. More precisely, a SoS is a complex system characterizedby the particular nature of its components: these latter, which are systems, tend tobe managerially and operationally independent as well as geographically distributed. Thisspecific characterization led to re-think research areas of classic SE such as definition, taxonomy,modeling, architecting and so on. SoS architecting focuses on the way independentcomponents of a SoS can be dynamically structured and can change autonomously theirinteractions in an efficient manner to fulfill the goal of the SoS and to cope with the highdynamics of the environment. This PhD thesis mainly focuses on two SoS research areas: 1)SoS modeling and 2) SoS architecting. To achieve the first point, we propose a new modelcalled SApHESIA (SoS Architecting HEuriStIc based on Agent). We have used set theoryand ABM (Agent-Based Model) paradigm to define this model that takes into account thecharacteristics of SoS. Secondly, we propose a new SoS architecting procedure based on theAdaptive Multi-Agent System (AMAS) approach that advocates full cooperation betweenall the components of the SoS through the concept of criticality. This criticality is a metricthat represents the distance between the current state of a component and its goals. In thisprocedure, the SoS architecture evolves over time to self-adapt to the dynamics of the environmentin which it is plunged, while taking into account the respective local goals of itscomponents. Finally we instantiate this model and this procedure through 4 examples fromdifferent domains (military, logistics and exploratory missions) and validate the feasibility,the efficiency, the effectiveness and the robustness of the SoS architecting procedure we havedeveloped and proposed
Daoud, Ramez. "Wireless and wired Ethernet for intelligent transportation systems." Valenciennes, 2008. http://ged.univ-valenciennes.fr/nuxeo/site/esupversions/ace94389-4796-4b12-b00d-9d4eb917a682.
Full textThis study focuses on the wireless as well as the wired aspect of Intelligent Transportation Systems (ITS). The On-Board network of a future smart vehicle is designed using Switched Ethernet as a backbone. This architecture aims at minimizing the amount of wiring present in today’s cars. With the increasing demand of entertainment and connectivity, the proposed model provides the vehicle passengers with internet connection, video on-demand, voice over IP (VoIP) and video conference capabilities. Also, to help the driver, a smart real-time interactive communication scheme is developed to supply traffic information. A wireless communication model is built to support the moving entities in a light urban traffic area; the model is based on stigmergic algorithms running at the core of the system infrastructure. A WiFi model is used to supply wireless connectivity to mobile nodes in a given region. The Mobile IPv4 as well as Mobile IPv6 are tested. The mobile nodes always communicate with the central intelligence of the system to update the traffic information. The stigmergic algorithm processes this data and sends to all moving vehicles messages regarding the actual traffic map. This research focuses on the wireless aspect of the problem and optimizes the architecture to satisfy minimum packet loss in the path from the central correspondent node (CN) to the mobile nodes (MN). It is found that based on MIPv6 technique and using redundant packet transmission (burst communication) one can statistically reach satisfactory
Golden, Boris. "A unified formalism for complex systems architecture." Palaiseau, Ecole polytechnique, 2013. http://pastel.archives-ouvertes.fr/docs/00/82/71/07/PDF/phd.pdf.
Full textComplex industrial systems are typically artificial objects designed by men, involving a huge number of heterogeneous components (e. G. Hardware, software, or human organizations) working together to perform a mission. In this thesis, we are interested in modeling the functional behavior of such systems, and their integration. We will model real systems as functional black boxes (with an internal state), whose structure and behaviors can be described by the recursive integration of heterogeneous smaller subsystems. Our purpose is to give a unified and minimalist semantics for heterogeneous integrated systems and their integration
Dahmane, Khouloud. "Analyse d'images par méthode de Deep Learning appliquée au contexte routier en conditions météorologiques dégradées." Thesis, Université Clermont Auvergne (2017-2020), 2020. http://www.theses.fr/2020CLFAC020.
Full textNowadays, vision systems are becoming more and more used in the road context. They ensure safety and facilitate mobility. These vision systems are generally affected by the degradation of weather conditions, like heavy fog or strong rain, phenomena limiting the visibility and thus reducing the quality of the images. In order to optimize the performance of the vision systems, it is necessary to have a reliable detection system for these adverse weather conditions.There are meteorological sensors dedicated to physical measurement, but they are expensive. Since cameras are already installed on the road, they can simultaneously perform two functions: image acquisition for surveillance applications and physical measurement of weather conditions instead of dedicated sensors. Following the great success of convolutional neural networks (CNN) in classification and image recognition, we used a deep learning method to study the problem of meteorological classification. The objective of our study is to first seek to develop a classifier of time, which discriminates between "normal" conditions, fog and rain. In a second step, once the class is known, we seek to develop a model for measuring meteorological visibility.The use of CNN requires the use of train and test databases. For this, two databases were used, "Cerema-AWP database" (https://ceremadlcfmds.wixsite.com/cerema-databases), and the "Cerema-AWH database", which has been acquired since 2017 on the Fageole site on the highway A75. Each image of the two bases is labeled automatically thanks to meteorological data collected on the site to characterize various levels of precipitation for rain and fog.The Cerema-AWH base, which was set up as part of our work, contains 5 sub-bases: normal day conditions, heavy fog, light fog, heavy rain and light rain. Rainfall intensities range from 0 mm/h to 70mm/h and fog weather visibilities range from 50m to 1800m. Among the known neural networks that have demonstrated their performance in the field of recognition and classification, we can cite LeNet, ResNet-152, Inception-v4 and DenseNet-121. We have applied these networks in our adverse weather classification system. We start by the study of the use of convolutional neural networks. The nature of the input data and the optimal hyper-parameters that must be used to achieve the best results. An analysis of the different components of a neural network is done by constructing an instrumental neural network architecture. The conclusions drawn from this analysis show that we must use deep neural networks. This type of network is able to classify five meteorological classes of Cerema-AWH base with a classification score of 83% and three meteorological classes with a score of 99%Then, an analysis of the input and output data was made to study the impact of scenes change, the input's data and the meteorological classes number on the classification result.Finally, a database transfer method is developed. We study the portability from one site to another of our adverse weather conditions classification system. A classification score of 63% by making a transfer between a public database and Cerema-AWH database is obtained.After the classification, the second step of our study is to measure the meteorological visibility of the fog. For this, we use a neural network that generates continuous values. Two fog variants were tested: light and heavy fog combined and heavy fog (road fog) only. The evaluation of the result is done using a correlation coefficient R² between the real values and the predicted values. We compare this coefficient with the correlation coefficient between the two sensors used to measure the weather visibility on site. Among the results obtained and more specifically for road fog, the correlation coefficient reaches a value of 0.74 which is close to the physical sensors value (0.76)
Ziv, Nicolas. "Enrichment of functional analysis for the construction sector by the integration of systems engineering and constructibility : application to the multifunctional metro." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1065/document.
Full textObjectives of the thesis is to enrich Functional Analysis, a design method oriented on the definition of functions, by the integration of two methodological corpuses: Constructability and Systems Engineering in order to adapt it to complex construction products. The enriched method is used and applied on an innovative concept: the multifunctional metro. This new concept consists in the integration of new functions in a metro system: not only transport people but also energy, information, wastes, merchandises, water etc. in order to answer to several city needs with a unique infrastructure. In the introduction, after having describe challenges faced by the construction industry, we highlight that Functional Analysis has been used extensively in other industries to face similar issues. However, its application in the construction industry is limited due to particularities of the construction industry: each project is unique, construction projects are complex and that needs construction projects answer consists in adapting space in order to carry human or related activities. The identification of such particularities have led on one hand, to the consideration of constructability concepts and principles in Functional Analysis to better integrate development constraints of each project in the product development. On the other hand, to the consideration of Systems Engineering, a methodological corpus which objective is to manage complexity of projects. Firstly, Functional Analysis, Constructability and Systems Engineering corpuses are presented and issues are identified in these three methods either to adapt them to complex construction projects for their integration. Constructability notably, is improved with the integration of constraints from Design and Planning phases and a proposition is presented to shift from Constructability to Constructibility. Systems Engineering for its part is adapted by the integration of spatial characteristics of systems. A SysML tool (Systems Modeling Language) has been developed and linked with a BIM modeling tool to improve the capacity to model and verify requirements related to construction systems. The Constructibility matrix, a tool to ease the implementation of constructibility has also been developed.Secondly, Functional Analysis enriched by methodological inputs and tools related to the construction industry is applied. Case studies concern two different phases (planning and design) in two different projects where multifunctionnality concepts have been investigated: the 5th metro line of Lyon where the evaluation of the integration of new functions in the metro line have been studied. And the line 16 of the Greater Paris Project where the integration of a broadband network was the opportunity to study the integration of a new function more in detail (transport information). In conclusion we shall suggest some ways forward by outlining avenues for further researches: how to measure constructibility criteria at different systemic levels is a challenge on which we give some ways to follow. The application and adaptation of Systems Engineering to the construction industry remains to be better investigated and we give some further research indications, particularly on the integration with BIM (Building Information Modeling) methods. We also present how the use of MBSE (Model-Based Systems Engineering) techniques and Data Science could lead to the automation of some design activities which could enrich Functional Analysis methods. Insights on the organization of the profession and contractual issues are proposed and would require more researches to enable implementation of the presented methodology in projects
Bazm, Mohammad Mahdi. "Unified isolation architecture and mechanisms against side channel attacks for decentralized cloud infrastructures." Thesis, Nantes, 2019. http://www.theses.fr/2019NANT4042.
Full textSince their discovery by Ristenpart [Ristenpart et al., 2009], the security concern of sidechannelattacks is raising in virtualized environments such as cloud computing infrastructuresbecause of rapid improvements in the attack techniques. Therefore, the mitigationand the detection of such attacks have been getting more attention in these environments,and consequently have been the subject of intense research works.These attacks exploit for instance sharing of hardware resources such as the processorin virtualized environments. Moreover, the resources are often shared between differentusers at very low-level through the virtualization layer. As a result, such sharing allowsbypassing security mechanisms implemented at virtualization layer through such a leakysharing. Cache levels of the processor are the resources which are shared between instances,and play as an information disclosure channel. Side-channel attacks thus use this leakychannel to obtain sensitive information such as cryptographic keys.Different research works are already exist on the detection/mitigation of these attackin information systems. Mitigation techniques of cache-based side-channel attacks aremainly divided into three classes according to different layer of application in cloud infrastructures(i.e., application, system, and hardware). The detection is essentially done atOS/hypervisor layer because of possibility of analyzing virtualized instances behavior atboth layers.In this thesis, we first provide a survey on the isolation challenge and on the cachebasedside-channel attacks in cloud computing infrastructures. We then present differentapproaches to detect/mitigate cross-VM/cross-containers cache-based side-channel attacks.Regarding the detection of cache-based side-channel attacks, we achieve that by leveragingHardware performance Counters (HPCs) and Intel Cache Monitoring Technology (CMT)with anomaly detection approaches to identify a malicious virtual machine or a Linux container.Our experimental results show a high detection rate.We then leverage an approach based on Moving Target Defense (MTD) theory to interrupta cache-based side-channel attack between two Linux containers. MTD allows us tomake the configuration of system more dynamic and consequently more harder to attackby an adversary, by using shuffling at different level of system and cloud. Our approachdoes not need to carrying modification neither into the guest OS or the hypervisor. Experimentalresults show that our approach imposes very low performance overhead.We also discuss the challenge of isolated execution on remote hosts, different scenariosto secure execution of Linux containers on remote hosts and different trusted executiontechnologies for cloud computing environments. Finally, we propose a secure model fordistributed computing through using Linux containers secured by Intel SGX, to performtrusted execution on untrusted Fog computing infrastructures
Mahdjoub, Morad. "La réalité virtuelle pour une conception de systèmes mécaniques centrée sur l'utilisateur." Besançon, 2007. http://www.theses.fr/2007BESA2039.
Full textOur thesis work carried out in the Systems and Transport laboratory (ERCOS team), deals with user-centred mechanical systems design. Our research is more specifically directed towards studying the mechanical systems which concern workstations. Indeed, one of the current problems for the industrialists is to be able to design workstations which are suitable for human (users/operators). The aim is to avoid the kind of serious health problems which are becoming apparent today, such as “repetitive strain injuries” (1st occupational disease declared in France and Europe). With this objective, we propose to study the “use” (or usability) of industrial equipment, by integrating “ergonomics” into the design process. Although our work was carried out in the field of Engineering Science (Mechanical engineering), we tried to take the ergonomics aspect into account through a multi-disciplinary approach. Consequently, our research is centred within the Design For Ergonomics (DFE) and design For Usability (DFU) disciplines which comes under the discipline of Design For X (DFX). Thus, our objective is to define a methodology, and associated tools, to be integrated into the ergonomic design process of both product and use. Thus, we successively studied two research hypotheses, by means of a first set of experiments carried out in the field of fine leather luxury goods. Our first research hypothesis is to study the use of a numerical mechanical system via the design of an interaction between the real user and this system. The second research hypothesis is to study the usefulness of virtual reality (VR), as a real-time virtual prototyping tool, to design the “use function” of the product and so the “human/numerical product” interaction. Within the context of a second set of experiments, carried out in the automobile industry and agro-alimentary fields, we studied a third research hypothesis. This third assumption is that VR can be used to design, in an interactive way, both the product and the product use earlier in the design process and in particular during the phases of preliminary studies and detailed studies. In order to generalise our experimental results, we identified various limitations of our results. It led us to consider integrating virtual reality into the design process through the definition of “design activities”. We thus propose a fourth research hypothesis: “virtual reality can be integrated, in a structured way, into a human-centred product design and development process”. Thus, our final contribution, based on all feedback from these experiments, introduces an original design methodology called Virtual Reality Aided Design for Use (VRADU). The first originality of our work is to propose using the application of VRADU methodology in all design stages implying a digital mock-Up (DMU) or a virtual prototype. For this reason, we introduced the concept of “virtual reality meeting point” which makes it possible to support the teamworking and the integration of the various disciplines within the design process. VRADU methodology defines, in a structured way, the impact of VR tools during the design of the product and its associated use. Thus, we defined the design actors concerned by the “virtual prototype and associated use” simulations in VR. We also defined their actions through role definition which can be assigned to them during simulations in VR. We proposed three “design activities” which use VR tools, within the VRADU methodology framework. These are: the qualitative ergonomic analysis of both product and associated use in VR, the quantitative ergonomic evaluation of both the product and associated use in VR and the design of the virtual prototype and its associated use in VR. The first “design activity” in VR proposes to evaluate, in an immersive and interactive way, product and product-use on the basis of subjective comments (qualitative aspects of use). The second originality of our work is to propose a second “design activity”, carried out using VR, which integrates tools for quantitative ergonomic analysis of the use, in order to supplement the qualitative recommendations already obtained. The third originality of our work lies in the third “design activity” in VR which is to modify the virtual prototype , in an interactive way and in real-time, during simulations in VR according to the previous ergonomic evaluations (objective and subjective) already made. For that, we developed a CAD type VR assembly module which makes it possible for the mechanical engineer to modify the virtual workstation structure within certain limits. A direct update of these modifications is possible on the native CAD model level due to the connection between the VR tools and the parametric CAD tools. This partially decreases the interworking problems between the various simulation tools. Finally, we ensured continuity in the virtual prototype development during its design. Indeed, the parameters modified on the virtual prototype are stored in a collaborative design tool of PLM type. These parameters can be re-used, thereafter, by other designers, thus ensuring permanent updating of the product data
Warriner, Vanessa. "La responsabilité des controleurs aériens dans les systèmes américain et français /." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30804.
Full textCrémilleux, Damien. "Visualization for information system security monitoring." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0013.
Full textA security operations center, SOC, is a key element for the security of information systems. In this thesis, weexhibited the limitations of SOCs and proposed a process associated with two tools to answer them. Ourcontributions enable a better collaboration between the security analysts working in SOCs and facilitate securityevents triage thanks to visualization
Morgère, Jean-Christophe. "Mobile augmented reality system for maritime navigation." Thesis, Lorient, 2015. http://www.theses.fr/2015LORIS365/document.
Full textCompared to the other activities, the sailor's environment has been enhanced with electronic devices in order to help the sailor and improve the security. In case of maritime navigation, these devices are mainly used to give information on the environment which the boat moves such as the water depth, seamarks for instance and its state: bearing, speed, etc. The complexity and the number of devices onboard depend on the boat size, from a wearableGPS on a jet-ski to a complex set of ECDIS, radar and AIS on a merchant ship. Today, despite the evolution of the navigational aid devices, the accidents still happen and they are due in part to human errors (33%). There are 3 main causes: The cognitive load issue. The latter is linked to the complexity of devices (ECDIS for instance [Jie and Xian-Zhong, 2008]); their quantity and their orientations which is different from the bridge view or the user's field of view [Prison and Porathe, 2007]. The information's mobility. Most of the devices onboard are put in a specific place and the data are not accessible outside this place. The lack of practice of the recreational boats owner. The maritime navigation rules are vital to sail safely but some of sailors can forget some significations and an accident may result from a wrong choice.In this thesis, we provide a mobile solution to make accessible data everywhere on the boat. Furthermore, the prototype is based on the augmented reality technology to display data in the user's field of view to reduce cognitive load. Finally, the application run on the prototype delivers only the relevant information for a safe navigation. The first part in this thesis details a user study conducted to understand the sailor's habits and their needs in order to select data to display and their graphical representation. Following this study, a needs analysis on the software and hardware has been realized. The purpose of this analysis is to list the different elements that are usable under maritime constraints (sun, fog, night, swell, mobility) in order to provide a device and a mobile application based on the augmented reality technology.The second part in this thesis reaches the prototype (architecture, display) and the software design. Both of them aim to help the sailors when the weather is bad. The technology used in this new tool is the augmented reality, more precisely an Optical see-Through system. The principle of the application run on the prototype is like a server, which provides services to the user depending on devices available onboard, while limiting the sailor's cognitive load. Indeed, the applications keeps only the useful data and display them in the user's field of view, furthermore they are superimposed on his/her direct view of the world.The last part in this thesis details the chart generator, which allows us to extract maritime data from different chart formats to adopt the 3D one used in the application. The latter is able to automate the placement of the 3D objects to build the buoyage system, landmarks, etc. This generator has been developed to recreate the danger areas such as depth areas, prohibited diving areas and so on. This has been done to satisfy user's expectations from the jet-ski to the yacht owner and the fisher man to the diver for instance
Cisneros, Montoya Rafael. "Commande PI basée sur la passivité : application aux systèmes physiques." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLS187/document.
Full textOne of the best known forms of feeding back a system is through a three-term control law called PID (Proportional-Integral-Derivative) controller. PID controllers are sufficient for many control problems, particularly when process dynamics are not highly nonlinear and the performance requirements are modest. Besides, because of its simple structure, the PID controller is the most adopted control scheme by industry and practitioners, beeing the PI the form mostly employed. Since the PI tuning methods are based on the linearization, commissioning a PI to operate around a single operating point is relatively easy, however, the performance will be below par in wide operating regimes. To overcome this drawback the current practice is to re-tune the gains of the PI controllers based on a linear model of the plant evaluated at various operating points, a procedure known as gain-scheduling. There are several disadvantages of gain-scheduling including the need to switch (or interpolate) the controller gains and the non-trivial definition of the regions in the plants state space where the switching takes place - both problems are exacerbated if the dynamics of the plant is highly nonlinear. In other common scenarios, a little information about the process dynamics or only a "good" linear approximation is taken into account when designing the control design. This impedes to analyse the global stability of the system. In this context, the current thesis work is aimed at the designing of PI controllers, based on the passivity theory, such that the stability of the closed-loop system is guarantied. One of the main advantages of passivity concepts is that they offer a physical and intuitive appeal. The primary idea in passive systems is that the power flowing into the system is not less that the increase of storage. Thus, they cannot store more energy than is supplied to it from the outside, with the difference being the dissipated energy. Thus, introducing the concept of energy, this methodology allows to recast the control problem as finding a dynamical system such that system energy function takes the desired form. Also, with this formulation, the communication between practitioners and control theorists is facilitated, incorporating prior knowledge of the system and providing physical interpretations of the control action. In this thesis, a constructive methodology for deriving PI passivity-based controllers is presented and motivated by the application to physical systems
Wailly, Aurélien. "End-to-end security architecture for cloud computing environments." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0020.
Full textSince several years the virtualization of infrastructures became one of the major research challenges, consuming less energy while delivering new services. However, many attacks hinder the global adoption of Cloud computing. Self-protection has recently raised growing interest as possible element of answer to the cloud computing infrastructure protection challenge. Yet, previous solutions fall at the last hurdle as they overlook key features of the cloud, by lack of flexible security policies, cross-layered defense, multiple control granularities, and open security architectures. This thesis presents VESPA, a self-protection architecture for cloud infrastructures. Flexible coordination between self-protection loops allows enforcing a rich spectrum of security strategies. A multi-plane extensible architecture also enables simple integration of commodity security components.Recently, some of the most powerful attacks against cloud computing infrastructures target the Virtual Machine Monitor (VMM). In many case, the main attack vector is a poorly confined device driver. Current architectures offer no protection against such attacks. This thesis proposes an altogether different approach by presenting KungFuVisor, derived from VESPA, a framework to build self-defending hypervisors. The result is a very flexible self-protection architecture, enabling to enforce dynamically a rich spectrum of remediation actions over different parts of the VMM, also facilitating defense strategy administration. We showed the application to three different protection scheme: virus infection, mobile clouds and hypervisor drivers. Indeed VESPA can enhance cloud infrastructure security
Sbai, Hugo. "Système de vidéosurveillance intelligent et adaptatif, dans un environnement de type Fog/Cloud." Thesis, Lille, 2018. http://www.theses.fr/2018LIL1I018.
Full textCCTV systems use sophisticated cameras (network cameras, smart cameras) and computer servers for video recording in a fully digital system. They often integrate hundreds of cameras generating a huge amount of data, far beyond human agent monitoring capabilities. One of the most important and modern challenges, in this field, is to scale an existing cloud-based video surveillance system with multiple heterogeneous smart cameras and adapt it to a Fog / Cloud architecture to improve performance without a significant cost overhead. Recently, FPGAs are becoming more and more present in FCIoT (FoG-Cloud-IoT) platform architectures. These components are characterized by dynamic and partial configuration modes, allowing platforms to quickly adapt themselves to changes resulting from an event, while increasing the available computing power. Today, such platforms present a certain number of serious scientific challenges, particularly in terms of deployment and positioning of FoGs. This thesis proposes a video surveillance model composed of plug & play smart cameras, equipped with dynamically reconfigurable FPGAs on a hierarchical FOG / CLOUD basis. In this highly dynamic and scalable system, both in terms of intelligent cameras (resources) and in terms of targets to track, we propose an automatic and optimized approach for camera authentication and their dynamic association with the FOG components of the system. The proposed approach also includes a methodology for an optimal allocation of hardware trackers to the electronic resources available in the system to maximize performance and minimize power consumption. All contributions have been validated with a real size prototype
Fouquet, Céline. "Bases neurales des systèmes de mémoire et de leurs dysfonctionnents au cours du vieillissement." Paris 6, 2009. http://www.theses.fr/2009PA066425.
Full textJagoret, Patrick. "Analyse et évaluation de systèmes agroforestiers complexes sur le long terme : application aux systèmes de culture à base de cacaoyer au Centre Cameroun." Thesis, Montpellier, SupAgro, 2011. http://www.theses.fr/2011NSAM0012.
Full textCocoa cultivation is generally considered as one of the main deforestation factors in the Tropics. Indeed, in many countries it is based on a low-sustainability technical model of intensive monocrops with shifting production zones. Cocoa agroforests, which are often neglected by research due to their low fermented dried cocoa yields, now appear to be a credible alternative for taking up the new challenges facing world cocoa production. In Centre-South Cameroon, cocoa cultivation is largely based on old cocoa agroforests, which suggests that a sustainable cocoa growing model based on agroforestry systems is possible. Our aim was to more effectively understand how these cocoa agroforests function, through their characteristics, their evolution and their determinants, along with the conditions for their long-term fermented dried cocoa production. Our approach consisted of an evaluation of cocoa agroforests on a plot scale and a comprehensive analysis of technical practices over the long term. The thesis is based on an experimental design set up in the Centre region, in three growing zones that could be differentiated through their pedo climatic conditions (Bokito, Zima and Ngomedzap). A large-scale survey was undertaken (1,171 farms grouping 1,638 cocoa plantations) completed by specific observations collected in a network of 61 cocoa agroforests managed by 40 farmers. Results. (1) Our survey results, completed by specific observations, confirmed the sustainability of the cocoa agroforestry systems from an agro ecological and socio-economic viewpoint. (2) In the forest-savannah transition zone, which is considered sub-optimum for cocoa cultivation, we confirmed that the technical model adopted by the farmers enabled them to set up cocoa agroforests on savannah that were viable over the long term. (3) In the network, a participatory method applied to quantify the use value given to the species by the farmers confirmed the multi-functionality of cocoa agroforests and measured the place occupied in it by cocoa. (4) The evaluation of the cocoa tree stands, achieved by adapting the regional agronomic diagnosis method to complex systems, revealed the factors limiting cocoa yield. It was proved that cocoa yield is closely linked to the structure of the cocoa tree stand and that of the intercropped stands. (5) Lastly, a comprehensive analysis of farmer practices over the long term, in association with the evolution of the technical management of the cocoa tree stands, confirmed the flexibility of cocoa agroforestry systems. This flexibility was reflected in the evolution pathways for specific practices and structures. This work provides a new methodological basis to assess the performance of complex agroforestry systems. All the results and knowledge produced by this work make it possible to draw up proposals for developing a new technical model for cocoa growing
Louis, Julien. "Discrétisation des systèmes de Lur'e : stabilisation et consistance." Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0080/document.
Full textRecent studies dealing with discrete-time (switched) Lur’e systems involve an adapted Lur’e type function exhibiting possibly non-convex and disconnected level sets. These properties raise fundamental issues in the case of discrete-time Lur’e system obtained by the sampling of a continuous time one. This PhD thesis aims at answering these questions. The first contribution is to avoid the discrete-time disconnected level sets by a decreasing sequence of bounded and connected sets that converges to the origin and that contain the future of the continuous-time trajectory. The second contribution deals with the joint stabilization of a sampled-data Lur’e system with non-uniform sampling. When the sampling period belongs to a finite set of values, this problem is reformulated as the joint stabilization of a discrete-time Lur’e switched system with norm-bounded uncertain parameters. Futhermore, if a quadratic criterion is associated with each mode, a min-switching strategy combined with LMI constraints allow to provide a solution to this problem. Finally the property of consistency for discrete-time switched Lur’e systems is investigated. It is shown that the min-switching strategy is consistent with respect to quadratic upper bounds of the performances. This result is applied on the stabilization of Lur’e systems with non-uniform sampling
Sneessens, Inès. "La complémentarité entre culture et élevage permet-elle d’améliorer la durabilité des systèmes de production agricole ? : Approche par modélisation appliquée aux systèmes de polyculture-élevage ovin allaitant." Thesis, Clermont-Ferrand 2, 2014. http://www.theses.fr/2014CLF22505/document.
Full textSpecialization of farming systems and territories are not environmental-friendly, moreover those systems are threatened by the expected higher prices of inputs of production. Diversification and integration of crop and livestock at the farming system scale appears to be a valuable way to enhance farming system sustainability. We posit that they must be conditions of integration that permit mixed crop-livestock systems to be more sustainable than specialized systems and that existing methods of mixed crop-livestock systems characterization do not permit identifying those conditions. To test those hypothesis, we designed a whole-farm model – Sheep’n’Crop – that permits simulating contrasted mixed crop-livestock systems and evaluating (i) their sustainability through economic, productive and environmental (MJ, GHG, N balance) indicators and (ii) their energetic efficiency through a DEA production frontier analysis in order to characterize the complementarity that exists between crop and livestock subsystems. Those analyses were run on three contrasted farming system strategies, distinguished by a decreasing possibility of interactions between crop and livestock subsystems: integrated systems, non-integrated systems and virtual diversified systems. Those systems are also characterized by various crop-livestock organizations (% of crops) and lambing’s periods (spring or autumn). The analysis of sustainability indicates that crop-livestock interactions and spring seasonality permit enhancing each performance of sustainability. However, a high percentage of crops makes decrease the MJ consumption and N balance performances. The characterization of mixed crop-livestock systems through their energetic efficiency gains – the complementarity – show that integrated and non-integrated systems are respectively more efficient than virtual diversified systems by +6.4% and +0.4%. Comparing the complementarity index and indicators of sustainability of farming systems, we highlighted the existence of trade-off. Before analyzing and identifying the best trade-off compromise, we recommend completing our results by testing various pedoclimatic and socio-economic context, the effect of scale efficiencies, the effect of livestock intensification and increasing agronomic and technical effects of crop-livestock interactions
Rioual, Yohann. "RL-based Energy Management for Autonomous Cyber Physical Systems." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS533.
Full textThe energy management of a cyber physical system is a difficult task because of the complexity of hardware architectures and the use of OS. In addition, these systems are deployed in changing environments where their energy harvesting capacity varies. Over time, their energy consumption is modified due to the ageing of the components. Consumption models designed in the laboratory cannot take into account all possible deployment scenarios and system aging. One approach that is developing is the use of reinforcement learning in which we no longer know the system's consumption model; but thanks to this approach, the system is still able to adapt its operation during its deployment according to the evolution of its environment. Several approaches exist in reinforcement learning. The first part of this thesis is devoted to proposing guidelines to help for selecting the most appropriate approach for a given application and target. The second part of this thesis focuses on the design of the reward we give to our system that will influence its behaviour in its environment. Two reward functions able to adjust the system’s performance according to the energy available are presented. The third and last part of this thesis explores the use of several agents to independently control the different modules of our system. This approach allows a more precise control of energy consumption, reducing memory usage compared to a single agent approach
Louis, Julien. "Discrétisation des systèmes de Lur'e : stabilisation et consistance." Electronic Thesis or Diss., Université de Lorraine, 2015. http://www.theses.fr/2015LORR0080.
Full textRecent studies dealing with discrete-time (switched) Lur’e systems involve an adapted Lur’e type function exhibiting possibly non-convex and disconnected level sets. These properties raise fundamental issues in the case of discrete-time Lur’e system obtained by the sampling of a continuous time one. This PhD thesis aims at answering these questions. The first contribution is to avoid the discrete-time disconnected level sets by a decreasing sequence of bounded and connected sets that converges to the origin and that contain the future of the continuous-time trajectory. The second contribution deals with the joint stabilization of a sampled-data Lur’e system with non-uniform sampling. When the sampling period belongs to a finite set of values, this problem is reformulated as the joint stabilization of a discrete-time Lur’e switched system with norm-bounded uncertain parameters. Futhermore, if a quadratic criterion is associated with each mode, a min-switching strategy combined with LMI constraints allow to provide a solution to this problem. Finally the property of consistency for discrete-time switched Lur’e systems is investigated. It is shown that the min-switching strategy is consistent with respect to quadratic upper bounds of the performances. This result is applied on the stabilization of Lur’e systems with non-uniform sampling
Wailly, Aurélien. "End-to-end security architecture for cloud computing environments." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0020/document.
Full textSince several years the virtualization of infrastructures became one of the major research challenges, consuming less energy while delivering new services. However, many attacks hinder the global adoption of Cloud computing. Self-protection has recently raised growing interest as possible element of answer to the cloud computing infrastructure protection challenge. Yet, previous solutions fall at the last hurdle as they overlook key features of the cloud, by lack of flexible security policies, cross-layered defense, multiple control granularities, and open security architectures. This thesis presents VESPA, a self-protection architecture for cloud infrastructures. Flexible coordination between self-protection loops allows enforcing a rich spectrum of security strategies. A multi-plane extensible architecture also enables simple integration of commodity security components.Recently, some of the most powerful attacks against cloud computing infrastructures target the Virtual Machine Monitor (VMM). In many case, the main attack vector is a poorly confined device driver. Current architectures offer no protection against such attacks. This thesis proposes an altogether different approach by presenting KungFuVisor, derived from VESPA, a framework to build self-defending hypervisors. The result is a very flexible self-protection architecture, enabling to enforce dynamically a rich spectrum of remediation actions over different parts of the VMM, also facilitating defense strategy administration. We showed the application to three different protection scheme: virus infection, mobile clouds and hypervisor drivers. Indeed VESPA can enhance cloud infrastructure security
Brandon, Quentin. "Numerical method of bifurcation analysis for piecewise-smooth nonlinear dynamical systems." Toulouse, INSA, 2009. http://eprint.insa-toulouse.fr/archive/00000312/.
Full textIn the field of dynamical system analysis, piecewise-smooth models have grown in popularity due to there greater flexibility and accuracy in representing some hybrid systems in applications such as electronics or mechanics. Hybrid dynamical systems have two sets of variables, one which evolve in a continuous space, and the other in a discrete one. Most analytical methods require the orbit to be smooth during objective intervals, so that some special treatments are inevitable to study the existence and stability of solutions in hybrid dynamical systems. Based on a piecewise-smooth model, where the orbit of the system is broken down into locally smooth pieces, and a hybrid bifurcation analysis method, using a Poincare map with sections ruled by the switching conditions of the system, we review the analysis process in details. Then we apply it to various extensions of the Alpazur oscillator, originally a nonsmooth 2-dimension switching oscillator. The original Alpazur oscillator, as a simple nonlinear switching system, was a perfect candidate to prove the efficiency of the approach. Each of its extensions shows a new scenario and how it can be handled, in order to illustrate the generality of the model. Finally, and in order to show more of the implementation we used for our own computer-based analysis tool, some of the most relevant numerical methods we used are introduced. It is noteworthy that the emphasis has been put on autonomous systems because the treatment of non-autonomous ones only requires a simplification (no time variation). This study brings a strong and general framework for the bifurcation analysis of nonlinear hybrid dynamical systems, illustrated by some results. Among them, some interesting local and global properties of the Alpazur Oscillator are revealed, such as the presence of a cascade of cusps in the bifurcation diagram. Our work resulted in the implementation of an analysis tool, implemented in C++, using the numerical methods that we chose for this particular purpose, such as the numerical approximation of the second derivative elements in the Jacobian matrix
Liu, Ruotian. "Contributions to event driven control of batches Petri nets for steady state reaching." Electronic Thesis or Diss., Aix-Marseille, 2021. http://www.theses.fr/2021AIXM0656.
Full textThe problem considered in this thesis deals with the control of hybrid systems, studied from the discrete event systems (DES) theory viewpoint. The objective is to compute the transient trajectory for reaching a given state from an initial one. In the DES theory, generalized batches Petri nets (GBPN) enrich the classes of hybrid Petri nets by adding a new kind of nodes, called batch nodes. This thesis work is dedicated to a class of GBPN, controlled GBPN (cGBPN) without discrete nodes. In this class, a state in which the marking and the firing flow vector are constant is defined to be a steady state. In this context, we propose three control strategies for reaching a reachable steady state under the conservative and consistent assumptions. The first one, called steady flow control law, is based on an ON/OFF state of transitions for which the maximal firing flow of each ON-transition is limited to its steady firing flow. One drawback is that a blockness issue may occur, consequently, the target steady state may not be reached. A condition with respect to the initial marking quantity is proposed to avoid blocking quantity and reach the steady state by the control law. The second control law, called maximal flow control law, is developed by using the maximal firing flow as the threshold. The third control law is dedicated to the case when the non-blocking condition on the initial marking quantity is not satisfied. This third control law is constructed to reach the attractive region from any blocking initial quantity. Finally, the proposed control methods have been implemented and their efficiency has been shown on a case study dedicated to a bottling production line
Mabrouk, Mohamed. "Proposition d'une méthode et d'un outil d'aide à la reconfiguration des systèmes automatisés de production." Valenciennes, 1996. https://ged.uphf.fr/nuxeo/site/esupversions/bb1377a3-80a9-42ca-8703-a7c13fd6373d.
Full textHuby, Elsa. "Caractérisation de systèmes binaires par imagerie haute dynamique non redondante fibrée." Phd thesis, Observatoire de Paris, 2013. http://tel.archives-ouvertes.fr/tel-00951542.
Full textHuby, Elsa. "Caractérisation de systèmes binaires par imagerie haute dynamique non redondante fibrée." Phd thesis, Observatoire de Paris (1667-....), 2013. http://www.theses.fr/2013OBSP0236.
Full textMy work has been carried out in the context of imaging at high angular resolution and high dynamic range, and in particular on the development of the instrument called FIRST, Fibered Imager foR a Single Telescope. Its principle relies on the novel technique of pupil remapping, combining aperture masking and spatial filtering of the wavefront thanks to single-mode fibers. The purpose of my thesis was to mount FIRST on a telescope, improve its performances and develop a pipeline for data reduction and analysis. First light of the instrument was obtained in July 2010 on the 3m Shane telescope at Lick Observatory. Afterwards, I have been working on different aspects of the optical and mechanical design, in order to improve its performances during observations. We have then conducted an observation campaign consisting of binary systems, which are ideal objects to assess the resolving power and the dynamic range of the instrument. For that purpose, I have developed a data reduction pipeline, allowing the estimation of interferometric observables from the fringe images and performing a fit of a binary model. I have obtained first results on the binary system Capella, which validate the concept of pupil remapping on-sky and demonstrate that this technique allows the recovery of the capabilities of a telescope at the diffraction limit and at visible wavelengths. Although the sensitivity of FIRST is still limited, these results are highly promising regarding observations to come at the Subaru telescope and more generally regarding future developments based on this technique, in particular in the context of exoplanet detection and characterization
Doualle, Benjamin. "Méthode d'évaluation de la soutenabilité en conception de Systèmes Produits-Services (PSS)." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEM002/document.
Full textNowadays, industry faces many challenges. The increased competition from the manufacturing industry which is resulting from the market globalization and from the scarcity and rising price of resources are pushing companies to innovate in order to remain competitive, in particular by reducing the flow of materials and energy. In addition, consumers seem to be more and more conscious of their impacts introduced by the concept of sustainable development. Products-services systems (or economy of functionality) are shown as an opportunity for the industry to offer solutions that are prosperous and respectful of the environment while meeting the needs of the consumer. However, these systems are not intrinsically sustainable. It is therefore necessary to create tools and methods to help companies develop this type of economic model with a view to sustainability.This research thesis aims to provide a method to assess the sustainability within the design process of a PSS. The specific characteristics of a sustainable PSS design must be taken into account in order to provide designers with valuable sustainability assessment and therefore support for their decision-making process. This method is intended to provide additional support in the decision-making process through qualitative and quantitative sustainability assessments
Zenadi, Mohamed. "Méthodes hybrides pour la résolution de grands systèmes linéaires creux sur calculateurs parallèles." Thesis, Toulouse, INPT, 2013. http://www.theses.fr/2013INPT0126/document.
Full textWe are interested in solving large sparse systems of linear equations in parallel. Computing the solution of such systems requires a large amount of memory and computational power. The two main ways to obtain the solution are direct and iterative approaches. The former achieves this goal fast but with a large memory footprint while the latter is memory friendly but can be slow to converge. In this work we try first to combine both approaches to create a hybrid solver that can be memory efficient while being fast. Then we discuss a novel approach that creates a pseudo-direct solver that compensates for the drawback of the earlier approach. In the first chapters we take a look at row projection techniques, especially the block Cimmino method and examine some of their numerical aspects and how they affect the convergence. We then discuss the acceleration of convergence using conjugate gradients and show that a block version improves the convergence. Next, we see how partitioning the linear system affects the convergence and show how to improve its quality. We finish by discussing the parallel implementation of the hybrid solver, discussing its performance and seeing how it can be improved. The last two chapters focus on an improvement to this hybrid solver. We try to improve the numerical properties of the linear system so that we converge in a single iteration which results in a pseudo-direct solver. We first discuss the numerical properties of the new system, see how it works in parallel and see how it performs versus the iterative version and versus a direct solver. We finally consider some possible improvements to the solver. This work led to the implementation of a hybrid solver, our "ABCD solver" (Augmented Block Cimmino Distributed solver), that can either work in a fully iterative mode or in a pseudo-direct mode
Corzo, Zavaleta Janet Ivonne. "Les difficultés des étudiants internationaux dans le système universitaire français : en quoi le Français sur Objectifs Universitaire (FOU) peut-il les aider à réussir leurs études ?" Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0071.
Full textThis work is part of the pedagogy of “French as Foreign Language”, and more specifically French for university purpose. It focuses on the reception of foreign students who moved to France and are having difficulties relating to their integration into the French university system.The objective of this work was to analyze the difficulties felt by international students studying in France as part of their university career. The most difficulties were related to linguistic, cultural and organizational aspects of the university system..This work gives leads and alternatives to improve the integration of foreign students in French universities. There fore we propose basis for the development of a program for French university purpose aimed at preparing students to acquire linguistic, disciplinary and methodological skills for university life due to an analysis of their specific needs
Issa, Homam. "Contributions à la conception de produits configurables dans les systèmes avancés de CAO." Thesis, Belfort-Montbéliard, 2015. http://www.theses.fr/2015BELF0282/document.
Full textProduct design is switching to the multi-site distributed design. Indeed, the complexity of products with engineeringand economic constraints have accelerated the transformation and organization of design activities into serviceorientedin a distributed network. So, design for product configuration emerges as an effective tool to address thenew challenges of product design. Many researches on design for configuration consider the design problem only asa problem of arrangement of components. Indeed, the design process involves multi-trades, distribution of tradesand actors, and interaction in a dynamic and uncertain environment. Moreover, we believe that the internal structureof the design process is a homomorphic image of the product perceived discontinuities. Considering the space ofthe design for the configuration as multi-views, multi-dimensional and uncertain, this thesis focuses on the study ofdesign for the configuration as a holistic problem.We proposed to study: (1) understand and model design for configuration as a consensus-building problem betweendifferent trades; (2) understand and model the relationships within and between domains considering the design forconfiguration as a holistic problem; (3) formalize the generative grammars for product modeling in two main spaces:functional and structural and (4) model the links between these two spaces with the concept of design holon. Fromthese considerations, we establish the most important assumptions of our research: (a) Assumption of multi-view;(b) Assumption of fuzzy; (c) Assumption of derivation; (d) Holistic assumption and (e) Assumption of attractor.We have described a design model for configuration wherein the optimization aspects of configurations andsearching of configurations cores are integrated. Moreover, we proposed fuzzy graphs functional grammars andformal fuzzy functional grammars to represent formally and graphically the functional structures of product. We alsoproposed an approach of holonic modeling for configurations. The concepts of Fuzzy Design Holon and FuzzyAttractor are proposed to understand the co-evolution in design for configuration. We studied an industrial case ofdesign for configuration using modules of a power train
Le, Gall Tristan. "Abstract lattices for the verification of systèmes with stacks and queues." Phd thesis, Université Rennes 1, 2008. http://tel.archives-ouvertes.fr/tel-00424552.
Full textLombardi, Giulia. "Unified nonlinear electrical interfaces for hybrid piezoelectric-electromagnetic small-scale harvesting systems." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI101.
Full textIn this research work, electronic nonlinear interfaces for hybrid energy harvesting systems combining piezoelectric and electromagnetic transducers are presented. Such systems have received great attention due to their ability to detect mechanical vibrations and convert them into electrical energy sufficient to power low-power sensors. In order to supply these microelectronic devices the generated sinusoidal signal needs to be rectified into a constant DC voltage. In other words, once the energy is converted, a proper and smart extraction of such energy needs to be implemented with a dedicated unit. The proposed nonlinear hybrid interfaces developed in this work, aimed at incorporating as much as electroactive parts as possible in the circuit, not only increase the final output power of the involved transducers but also provide a solution for obtaining a common optimal load value, despite dealing with elements singularly presenting different working principles and values of optimal load, without the use of additional load adaptation stages. A first solution is derived from the previously developed SSHI (Synchronized Switch Harvesting on Inductor) and based on the Synchronized Switching technique. This method aims at replacing the passive inductor in the SSHI interface with an active electromagnetic system, leading to an all-active microgenerators interface and increasing the final output power. A second solution is derived from a combination of the SECE (Synchronous Electric Charge Extraction) and SMFE (Synchronous Magnetic Flux Extraction) techniques. Its main principle consists of transferring the energy from the piezoelectric to the electromagnetic transducer and then extracting the boosted energy from the electromagnetic system. The strategy of including as much as electroactive parts within the same electrical interface open many different possibilities of interfacing more than one electroactive system, constituting hybrid energy harvesters, without including extra circuit stages, thus maintaining a relative simplicity without high power losses
Moro, Puppi Wanderley Gregory. "A framework for facilitating the development of systems of systems." Thesis, Compiègne, 2018. http://www.theses.fr/2018COMP2425/document.
Full textBuilding Systems of Systems (SoS) has gained momentum in various domains. Today, complex applications require to let several systems developed independently cooperate, leading to the moniker of SoS. Despite such popularity, no consensus has yet been reached about a precise definition of what SoS are. Moreover, the crux of the matter is that most applications are still handcrafted, being developed in an ad hoc fashion, i.e., freely and without being constrained by a predefined structure. Handcrafting SoS is an Herculean task for architects, requiring them to create an interwoven set of connections among SoS constituent systems for allowing cooperation. Because of the large number of interconnections, the complexity and tight coupling increase in SoS, and their evolution becomes more difficult, requiring substantial efforts from architects. To sever the Gordian knot faced by SoS architects, we propose in this research a generic framework for facilitating the development of SoS from a systems engineering perspective. Our approach is based on a novel architecture we call MBA for Memory-Broker-Agent. To test our framework we built an SoS for developing software collaboratively. Results show that our approach reduces the difficulty and effort for developing a SoS. Based on such results, we created an original method for building a SoS using our framework. We tested the potential of our method along with the generic features of our framework, by building a new SoS in the Health Care domain successfully and more accurately
Hamid, Brahim. "Distributed fault-tolerance techniques for local computations." Bordeaux 1, 2007. http://www.theses.fr/2007BOR13383.
Full textBenkamoun, Nadège. "Systemic design methodology for changeable manufacturing systems." Thesis, Clermont-Ferrand 2, 2016. http://www.theses.fr/2016CLF22723/document.
Full textManufacturing systems have become large scale systems with increasing complexity particularly magnified by highly changing contexts. The system’s ability to cope with change (i.e. changeability) is recognized as a critical lifecycle property in the manufacturing system and engineering design domains. Given the complexity of changeable manufacturing systems, the proposed methodology of this dissertation aims to support design of changeability in subscribing to the domain of system engineering. The first contribution is a formalism for modeling changeability in a systemic way. Flexibility and reconfigurability paradigms are not limited to physical components of the system, but to the overall system architecture that encompasses all engineering artifacts relating to the designed system in both the requirements and physical solution domains. The second contribution is the methodology for the design and the management of changeability. The methodology utilizes a lifecycle model for changeable systems, in which design for changeability phases alternate with re-design phases that embrace and benefit from the existing changeability capabilities. These complementary processes allow a better consistency between design decisions to embed and reuse changeability, increasing changeability potential during the lifecycle of complex systems. The developed concepts and methodologies are validated in manufacturing system design projects from an automotive supplier. Finally, perspectives on design tools assisting the proposed methodology are discussed
Clementini, Eliseo. "A conceptual framework for modelling spatial relations." Lyon, INSA, 2009. http://theses.insa-lyon.fr/publication/2009ISAL0028/these.pdf.
Full textLes modèles pour les relations spatiales ont stimulé un grand intérêt parmi les chercheurs dans les bases de données spatiales des années 90. On peut distinguer trois niveaux différents de représentation où nous pouvons identifier des relations spatiales : un niveau purement géométrique, où des objets sont représentés comme ensembles de points et les relations peuvent être formellement définies en termes mathématiques ; un niveau informatique, où les objets sont représentés en tant que types de données spatiaux et les relations sont calculées au moyen d'opérateurs spatiaux ; un niveau utilisateur, où les objets et les relations correspondent aux concepts du contexte d'utilisateur. Du point de vue géométrique, on peut considérer une catégorisation des relations spatiales dans trois groupes : topologique, projectif, et métrique. Ce mémoire de thèse propose à la fois un cadre général pour la modélisation des relations spatiales qualitatives, et présente des nouveaux développements pour les relations projectives. En offrant un cadre mathématique formel à une description qualitative des relations, les modèles envisagés se révèlent d’un grand intérêt dans la recherche en sciences de l’information géographique. La propriété géométrique la plus importante qui a été prise en considération est la colinéarité entre trois points. L’importance de cette propriété est telle qu’elle conditionne toute l’approche, en faisant des relations ternaires la base formelle des modèles envisagés. Nous avons développé les algorithmes pour calculer les relations à partir d'une structure de données en format vectoriel et un système de raisonnement sur les relations projectives ternaires. On a aussi étendu les modèles vers l’espace trois-dimensionnelles et la sphère. Du point de vue de l’utilisateur, les relations projectives doivent envisager l’information sur le contexte, en les combinant avec des systèmes de référence pour ôter les ambiguïtés du sens de la relation
Laslandes, Marie. "Miroirs actifs de l'espace - Développement de systèmes d'optique active pour les futurs grands observatoires." Phd thesis, Aix-Marseille Université, 2012. http://tel.archives-ouvertes.fr/tel-00764315.
Full textMoussaileb, Routa. "Log analysis for malicious software detection." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0211.
Full textRansomware remains the number one cyberthreat for individuals, enterprises, and governments. Malware’s aftermath can cause irreversible casualties if the requirements of the attackers are not met in time. This thesis targets Windows ransomware. It affects users’ data and undermines many public services. Four stages of this malware attack are defined: delivery, deployment, destruction, and dealing. The corresponding countermeasures are assigned to each phase of the attack and clustered according to the techniques used. This thesis presents three contributions. The first detection mechanism is located in the file system layer. It is based on the system traversal that is sufficient to highlight the malicious behavior. This thesis proposes also an analysis of the network traffic. It is generated by collected ransomware samples to perform a packet-level detection. A study of the ransom notes is made to define where it takes place in a ransomware workflow. The last contribution provides an insight into plausible attacks, especially Doxware. A quantification model that explores the Windows file system in search of valuable data is presented. It is based on the term frequency-inverse document frequency solution provided in the literature for information retrieval. Honeypot techniques are also used to protect the sensitive files of the users. Finally, this thesis provides future perspectives granting a better roadmap for researchers
Durand, William. "Automated test generation for production systems with a model-based testing approach." Thesis, Clermont-Ferrand 2, 2016. http://www.theses.fr/2016CLF22691/document.
Full textThis thesis tackles the problem of testing (legacy) production systems such as those of our industrial partner Michelin, one of the three largest tire manufacturers in the world, by means of Model-based Testing. A production system is defined as a set of production machines controlled by a software, in a factory. Despite the large body of work within the field of Model-based Testing, a common issue remains the writing of models describing either the system under test or its specification. It is a tedious task that should be performed regularly in order to keep the models up to date (which is often also true for any documentation in the Industry). A second point to take into account is that production systems often run continuously and should not be disrupted, which limits the use of most of the existing classical testing techniques. We present an approach to infer exact models from traces, i.e. sequences of events observed in a production environment, to address the first issue. We leverage the data exchanged among the devices and software in a black-box perspective to construct behavioral models using different techniques such as expert systems, model inference, and machine learning. It results in large, yet partial, models gathering the behaviors recorded from a system under analysis. We introduce a context-specific algorithm to reduce such models in order to make them more usable while preserving trace equivalence between the original inferred models and the reduced ones. These models can serve different purposes, e.g., generating documentation, data mining, but also testing. To address the problem of testing production systems without disturbing them, this thesis introduces an offline passive Model-based Testing technique, allowing to detect differences between two production systems. This technique leverages the inferred models, and relies on two implementation relations: a slightly modified version of the existing trace preorder relation, and a weaker implementation proposed to overcome the partialness of the inferred models.Overall, the thesis presents Autofunk, a modular framework for model inference and testing of production systems, gathering the previous notions. Its Java implementation has been applied to different applications and production systems at Michelin, and this thesis gives results from different case studies. The prototype developed during this thesis should become a standard tool at Michelin
Perrot, Clément. "Imagerie directe de systèmes planétaires avec SPHERE et prédiction des performances de MICADO sur l’E-ELT." Thesis, Sorbonne Paris Cité, 2017. http://www.theses.fr/2017USPCC212/document.
Full textThis thesis is performed in the context of the study of the formation and evolution of planetary systems using high contrast imaging, also known as direct imaging in contrast to so-called "indirect" detection methods. The work I present in this manuscript is divided into two distinct parts.The first part concerns the observational component of my thesis, using the SPHERE instrument installed at Very LargeTelescope. This work was done as part of the consortium of the same name. The purpose of the SPHERE instrument is to detect and characterize young and massive exoplanets, but also circumstellar disks ranging from very young protoplanetary disks to older debris disks. In this manuscript, I present my contribution to the program SHINE, a large survey with an integration time of 200 nights' worth of observation, the goal of which is the detection of new exoplanets and the spectral and orbital characterization of some previously-known companions. I also present the two studies of circumstellar disks that I made, around the stars HD 141569 and HIP 86598. The first study allowed the discovery of concentric rings at about ten AU of the star along with an unusual flux asymmetry in the disk. The second study is about the discovery of a debris disk that also has an unusual flux asymmetry. The second part concerns the instrumental component of my thesis work done within the MICADO consortium, in charge of the design of the camera of the same name which will be one of the first light instruments of the European Extremely Large Telescope (ELT). In this manuscript, I present the study in which I define the design of some components of the coronagraphic mode of MICADO while taking into account the constraints of the instrument - which is not dedicated to high contrast imaging, unlike SPHERE
Oliva, Venegas Yaset. "High level modeling of run-time managers for the design of heterogeneous embedded systems." Rennes, INSA, 2012. http://www.theses.fr/2012ISAR0017.
Full textIn order to circumvent the ever increasing difficulty of designing embedded systems, designers have to envisage using new methods and tools to abstract the level of description. These modern systems are usually composed of multiple complex functions of digital signal processing that are often implemented in heterogeneous (software and hardware) blocks. In this context, the current trend is to incorporate a kernel destined to manage these different processing blocks in a flexible and dynamic manner. As these blocks become too complex to handle, it is thus possible to add specific services to the kernel to manage it. This is particularly the case when the functions may run on multiple heterogeneous processors or in reconfigurable hardware. Considering all these aspects, the first part of this thesis is a contribution to a design tool and proposes a methodology to explore the structure of an embedded system. The tool allows the specification of three basic elements of a system: the application, the architecture and the operating system (kernel) from high level models. The methodology consists in specifying, simulating and analyzing these three basic elements. The process of exploration is performed iteratively until a satisfactory solution is reached. The second part of the thesis focused on an extension of a core model to dynamically manage the migration of tasks between different blocks (processors or reconfigurable areas). The proposed service is designed to manage the shared-memory architectures containing a kernel that supports a master / slave configuration. This Offloading service is part of the kernel model and adds new features (migration tasks, heterogeneous task management and the smart placement)
Chretien, Benoît. "Simulation of a new automotive concept based on a centralized approach for driver assistance system activation decision." Thesis, Evry-Val d'Essonne, 2012. http://www.theses.fr/2011EVRY0033.
Full textNowadays, to enhance traffic safety, more and more Advance Driver Assistance Systems (ADAS) are embedded in mass-production vehicles. Their increase renders development of vehicles more and more complex, especially to design Electronic and Electric (E/E) architecture, to synchronize the different embedded ADAS and decide which ADAS should be engaged. To cope with E/E architecture issues, my PhD thesis proposes a vehicle simulator, which is able to support architect designers. Then, to solve synchronization and decision problems, ADAS architecture has been chosen, according to the state of the art. Finally, a decision algorithm has been developed to optimise vehicle safety. To model the vehicle, a simulator emulates its plane motion according to embedded actuators acting on dynamic, like engine and brakes. Once the vehicle basis has been performed, I focus my work on ADAS. Because nowadays no generic solution exists to decide which ADAS to engage, last focus of my PhD has been the design of a decision method, optimizing vehicle safety. This latter couples a path-planning witch a Lyapunov invariant set, obtained through optimization problem constraints by bilinear matrix inequality. This strategy enables to assess embedded ADAS-functions and to warn the driver in critical situations. In order to illustrate this former, it has been illustrated with 2 longitudinal functions, a Adaptive Cruise Control and an Emergency Brake