Literatura académica sobre el tema "Systèmes fog"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Systèmes fog".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Systèmes fog"
Lee, Liza, Mireille Desroches, Shamir Mukhi y Christina Bancej. "ActionGrippe : évaluation d’une application de surveillance du syndrome d’allure grippale à externalisation ouverte pour les saisons grippales canadiennes 2015–2016 à 2018–2019". Relevé des maladies transmissibles au Canada 47, n.º 09 (10 de septiembre de 2021): 393–400. http://dx.doi.org/10.14745/ccdr.v47i09a02f.
Texto completoGélinas-Gagné, Charlotte y Miranda D'Amico. "Soutien des frères et sœurs d’un jeune touché de cancer : soins collaboratifs pour les familles". Canadian Oncology Nursing Journal 34, n.º 2 (30 de abril de 2024): 205–14. http://dx.doi.org/10.5737/23688076342205.
Texto completoJagt, John W. M., Anne S. Schulp y Douwe Th de Graaf. "The 150th anniversary of the Maastrichtian Stage - a celebratory conference: Introduction". Netherlands Journal of Geosciences - Geologie en Mijnbouw 82, n.º 3 (agosto de 2003): 223–24. http://dx.doi.org/10.1017/s0016774600020801.
Texto completoOjani, Chakad. "Smallness and Small-device Heuristics". Social Anthropology/Anthropologie Sociale 31, n.º 2 (1 de junio de 2023): 39–53. http://dx.doi.org/10.3167/saas.2023.310204.
Texto completoLange, Marie-France. "Le refus de l’école : pouvoir d'une société civile bloquée ?" Politique africaine 27, n.º 1 (1987): 74–86. http://dx.doi.org/10.3406/polaf.1987.3893.
Texto completoViollier, E., G. Mignard, G. Sarazin, A. Choouier, G. Roziere y P. Trameson. "Une sonde photométrique pour l'analyse in situ : Principe, méthode, premiers essais". Revue des sciences de l'eau 6, n.º 4 (12 de abril de 2005): 395–410. http://dx.doi.org/10.7202/705182ar.
Texto completoHuot, C., A. Paradis, K. Hammond-Collins, MA Bélair, J. Villeneuve, N. Brousseau, I. Goupil-Sormany y J. Riffon. "Un système de vigie rehaussée de santé publique pour un rassemblement de masse". Relevé des maladies transmissibles au Canada 45, n.º 7/8 (4 de julio de 2019): 233–46. http://dx.doi.org/10.14745/ccdr.v45i78a05f.
Texto completoJANCZEWSKI, A., M. JEGO-SABLIER y J. KHOUANI. "Droit universel à la santé pour les populations migrantes vulnérables". EXERCER 34, n.º 198 (1 de diciembre de 2023): 456–59. http://dx.doi.org/10.56746/exercer.2023.198.456.
Texto completoHUSSON, A., Y. LE GAT, A. VACELET, A. E. STRICKER, E. BRÉJOUX y E. RENAUD. "Évaluation du patrimoine des réseaux d’eau potable français dans le but d’améliorer la conduite des politiques publiques de gestion patrimoniale". Techniques Sciences Méthodes, n.º 5 (20 de mayo de 2020): 31–44. http://dx.doi.org/10.36904/tsm/202005031.
Texto completoBERKHOUT, C. "EFFICACITE DES INTERVENTIONS BREVES EN SOINS PREMIERS SUR LES USAGERS DE CANNABIS AGES DE 12 A 25 ANS. UNE REVUE SYSTEMATIQUE". EXERCER 34, n.º 190 (1 de febrero de 2023): 58–59. http://dx.doi.org/10.56746/exercer.2023.190.58.
Texto completoTesis sobre el tema "Systèmes fog"
Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes". Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Texto completoThe Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
Ozeer, Umar Ibn Zaid. "Autonomic resilience of distributed IoT applications in the Fog". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM054.
Texto completoRecent computing trends have been advocating for more distributed paradigms, namelyFog computing, which extends the capacities of the Cloud at the edge of the network, thatis close to end devices and end users in the physical world. The Fog is a key enabler of theInternet of Things (IoT) applications as it resolves some of the needs that the Cloud failsto provide such as low network latencies, privacy, QoS, and geographical requirements. Forthis reason, the Fog has become increasingly popular and finds application in many fieldssuch as smart homes and cities, agriculture, healthcare, transportation, etc.The Fog, however, is unstable because it is constituted of billions of heterogeneous devicesin a dynamic ecosystem. IoT devices may regularly fail because of bulk production andcheap design. Moreover, the Fog-IoT ecosystem is cyber-physical and thus devices aresubjected to external physical world conditions which increase the occurrence of failures.When failures occur in such an ecosystem, the resulting inconsistencies in the applicationaffect the physical world by inducing hazardous and costly situations.In this Thesis, we propose an end-to-end autonomic failure management approach for IoTapplications deployed in the Fog. The approach manages IoT applications and is composedof four functional steps: (i) state saving, (ii) monitoring, (iii) failure notification,and (iv) recovery. Each step is a collection of similar roles and is implemented, taking intoaccount the specificities of the ecosystem (e.g., heterogeneity, resource limitations). Statesaving aims at saving data concerning the state of the managed application. These includeruntime parameters and the data in the volatile memory, as well as messages exchangedand functions executed by the application. Monitoring aims at observing and reportinginformation on the lifecycle of the application. When a failure is detected, failure notificationsare propagated to the part of the application which is affected by that failure.The propagation of failure notifications aims at limiting the impact of the failure and providinga partial service. In order to recover from a failure, the application is reconfigured and thedata saved during the state saving step are used to restore a cyber-physical consistent stateof the application. Cyber-physical consistency aims at maintaining a consistent behaviourof the application with respect to the physical world, as well as avoiding dangerous andcostly circumstances.The approach was validated using model checking techniques to verify important correctnessproperties. It was then implemented as a framework called F3ARIoT. This frameworkwas evaluated on a smart home application. The results showed the feasibility of deployingF3ARIoT on real Fog-IoT applications as well as its good performances in regards to enduser experience
Manzalini, Antonio. "An operating system for 5G Edge Clouds". Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0013.
Texto completoTechnology and socio-economic drivers are creating the conditions for a profound transformation, called “Softwarization”, of the Telco and ICT. Software-Defined Networks and Network Functions Virtualization are two of the key enabling technologies paving the way towards this transformation. Softwarization will allow to virtualize all network and services functions of a Telco infrastructure and executing them onto a software platforms, fully decoupled from the underneath physical infrastructure (almost based on standard hardware). Any services will be provided by using a “continuum” of virtual resources (processing, storage and communications) with practically very limited upfront capital investment and with modest operating costs. 5G will be the first exploitation of Softwarization. 5G will be a massively dense distributed infrastructure, integrating processing, storage and (fixed and radio) networking capabilities. In summary, the overall goal of this thesis has been investigating technical challenges and business opportunities brought by the “Softwarization” and 5G. In particular, the thesis proposes that the 5G will have to have a sort of Operating System (5GOS) capable of operating the converged fixed and RAN and core infrastructures. Main contributions of this thesis have been: 1) defining a vision for future 5G infrastructures, scenarios, use-cases and main requirements; 2) defining the functional architecture of an Operating System for 5G; 3) designing the software architecture of a 5G OS for the “Edge Cloud”; 4) understanding the techno-economic impacts of the vision and 5GOS, and the most effective strategies to exploit it
Awad, Hiba. "Quality of service assurance before deployment of fog systems with model-based engineering and DevOps". Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2025. http://www.theses.fr/2025IMTA0468.
Texto completoFog Computing decentralizes the Cloud by bringing computation, storage, and network services closer to the edge. This reduces latency and bandwidth usage while improving real-time processing. However, the complexity and heterogeneity of Fog systems, often comprising diverse entities, make lifecycle management challenging and costly. Runtime error handling frequently requires revisiting earlier phases, which is both timeconsuming and expensive. Ensuring reliability through pre-deployment verification is therefore essential. Fog systems are deployed in domains such as healthcare, automotive, and smart cities, further complicating verification and deployment processes. To address these challenges, we propose a generic and customizable approach based on a two-step verification process. This approach focuses on the design-time and pre-deployment phases, automating key verification and deployment activities. Our solution features a customizable Fog modeling language, design-time verification of non-functional properties (e.g., security, energy), preparation of pre-deployment configurations, and integration with industrial DevOps tools and Quality of Service (QoS) solutions. By combining Model-Based Engineering and DevOps practices, our approach ensures QoS, reduces deployment costs, and enhances automation to tackle the complexity of Fog systems. We validated this approach using three literature-based use cases—smart campus, smart parking, and smart hospital. Results demonstrate its effectiveness in QoS verification, deployment automation, and reducing complexity and costs, highlighting its relevance to state-of-the-art engineering and DevOps practices
Manzalini, Antonio. "An operating system for 5G Edge Clouds". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0013.
Texto completoTechnology and socio-economic drivers are creating the conditions for a profound transformation, called “Softwarization”, of the Telco and ICT. Software-Defined Networks and Network Functions Virtualization are two of the key enabling technologies paving the way towards this transformation. Softwarization will allow to virtualize all network and services functions of a Telco infrastructure and executing them onto a software platforms, fully decoupled from the underneath physical infrastructure (almost based on standard hardware). Any services will be provided by using a “continuum” of virtual resources (processing, storage and communications) with practically very limited upfront capital investment and with modest operating costs. 5G will be the first exploitation of Softwarization. 5G will be a massively dense distributed infrastructure, integrating processing, storage and (fixed and radio) networking capabilities. In summary, the overall goal of this thesis has been investigating technical challenges and business opportunities brought by the “Softwarization” and 5G. In particular, the thesis proposes that the 5G will have to have a sort of Operating System (5GOS) capable of operating the converged fixed and RAN and core infrastructures. Main contributions of this thesis have been: 1) defining a vision for future 5G infrastructures, scenarios, use-cases and main requirements; 2) defining the functional architecture of an Operating System for 5G; 3) designing the software architecture of a 5G OS for the “Edge Cloud”; 4) understanding the techno-economic impacts of the vision and 5GOS, and the most effective strategies to exploit it
Duthon, Pierre. "Descripteurs d'images pour les systèmes de vision routiers en situations atmosphériques dégradées et caractérisation des hydrométéores". Thesis, Université Clermont Auvergne (2017-2020), 2017. http://www.theses.fr/2017CLFAC065/document.
Texto completoComputer vision systems are increasingly being used on roads. They can be installed along infrastructure for traffic monitoring purposes. When mounted in vehicles, they perform driver assistance functions. In both cases, computer vision systems enhance road safety and streamline travel.A literature review starts by retracing the introduction and rollout of computer vision algorithms in road environments, and goes on to demonstrate the importance of image descriptors in the processing chains implemented in such algorithms. It continues with a review of image descriptors from a novel approach, considering them in parallel with final applications, which opens up numerous analytical angles. Finally the literature review makes it possible to assess which descriptors are the most representative in road environments.Several databases containing images and associated meteorological data (e.g. rain, fog) are then presented. These databases are completely original because image acquisition and weather condition measurement are at the same location and the same time. Moreover, calibrated meteorological sensors are used. Each database contains different scenes (e.g. black and white target, pedestrian) and different kind of weather (i.e. rain, fog, daytime, night-time). Databases contain digitally simulated, artificial and natural weather conditions.Seven of the most representative image descriptors in road context are then selected and their robustness in rainy conditions is evaluated. Image descriptors based on pixel intensity and those that use vertical edges are sensitive to rainy conditions. Conversely, the Harris feature and features that combine different edge orientations remain robust for rainfall rates ranging in 0 – 30 mm/h. The robustness of image features in rainy conditions decreases as the rainfall rate increases. Finally, the image descriptors most sensitive to rain have potential for use in a camera-based rain classification application.The image descriptor behaviour in adverse weather conditions is not necessarily related to the associated final function one. Thus, two pedestrian detectors were assessed in degraded weather conditions (rain, fog, daytime, night-time). Night-time and fog are the conditions that have the greatest impact on pedestrian detection. The methodology developed and associated database could be reused to assess others final functions (e.g. vehicle detection, traffic sign detection).In road environments, real-time knowledge of local weather conditions is an essential prerequisite for addressing the twin challenges of enhancing road safety and streamlining travel. Currently, the only mean of quantifying weather conditions along a road network requires the installation of meteorological stations. Such stations are costly and must be maintained; however, large numbers of cameras are already installed on the roadside. A new method that uses road traffic cameras to detect weather conditions has therefore been proposed. This method uses a combination of a neural network and image descriptors applied to image patches. It addresses a clearly defined set of constraints relating to the ability to operate in real-time and to classify the full spectrum of meteorological conditions and grades them according to their intensity. The method differentiates between normal daytime, rain, fog and normal night-time weather conditions. After several optimisation steps, the proposed method obtains better results than the ones reported in the literature for comparable algorithms
Darrous, Jad. "Scalable and Efficient Data Management in Distributed Clouds : Service Provisioning and Data Processing". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEN077.
Texto completoThis thesis focuses on scalable data management solutions to accelerate service provisioning and enable efficient execution of data-intensive applications in large-scale distributed clouds. Data-intensive applications are increasingly running on distributed infrastructures (multiple clusters). The main two reasons for such a trend are 1) moving computation to data sources can eliminate the latency of data transmission, and 2) storing data on one site may not be feasible given the continuous increase of data size.On the one hand, most applications run on virtual clusters to provide isolated services, and require virtual machine images (VMIs) or container images to provision such services. Hence, it is important to enable fast provisioning of virtualization services to reduce the waiting time of new running services or applications. Different from previous work, during the first part of this thesis, we worked on optimizing data retrieval and placement considering challenging issues including the continuous increase of the number and size of VMIs and container images, and the limited bandwidth and heterogeneity of the wide area network (WAN) connections.On the other hand, data-intensive applications rely on replication to provide dependable and fast services, but it became expensive and even infeasible with the unprecedented growth of data size. The second part of this thesis provides one of the first studies on understanding and improving the performance of data-intensive applications when replacing replication with the storage-efficient erasure coding (EC) technique
Koubeissi, Ahmad. "Methodology for unified modeling of system of systems of engineering". Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10143/document.
Texto completoThe main focus of this thesis is on multilevel graphical modeling of behavior and organization of a set of component systems in a System of Systems concept. In the present work, we model the wireless communication link among component systems, with all its major effects, using a graphical modeling tool for describing flow of power in multi-physics domain called Bond Graph. This model permits identifying mathematically, the quality of signal received at information sink based on model parameter values. We conduct an experiment on cooperative behavior of two humanoids in a system of systems concept and demonstrate how we are able to experimentally measure the parameter values defined in our model.Next we justify how we are able to evaluate quantitatively, the fault tolerance level of a wireless communication link and introduce the need for redundant links in system of systems. Then we propose a methodology for coupling Hyper Graph, used for modeling the organization of component systems, and Bond Graph in multilevel graphical modeling of system of systems. Finally, we discuss another system of systems with two cooperating component systems, a Unmanned Aerial Vehicle (UAV) and an intelligent autonomous vehicle (robuTAINer), in which the UAV will supply navigation information to the intelligent autonomous vehicle to be able to safely maneuver in a confined space. We develop algorithms for robuTAINer detection and navigation from UAV. Then we practically test our algorithms and analyze the obtained results
Imine, Youcef. "Cloud computing security". Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Texto completoThese last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Bouziat, Teddy. "A Cooperative Architecting Procedure for Systems of Systems Based on Self-Adaptive Multi-Agent Systems". Thesis, Toulouse 1, 2017. http://www.theses.fr/2017TOU10069.
Texto completoSince the World War II, researchers have tended to develop methodologies and tools tobuild and control the development of more and more complex systems and projects. Thisinter-disciplinary research area has been called Systems Engineering (SE) and continues tobe developed nowadays. In 1990, the fall of USSR led the US Department of Defense (DoD)to re-think its defense doctrine and to switch from a one opponent confrontation to a globalizationof conflicts with a huge variety of scenarios. Its idea was to re-use and join itsdefense systems by producing a huge, decentralized and adaptive defense system that iscomposed of existing and independents (complex) systems. This is the apparition of theSystem of Systems (SoS) concept. After 2000’s, this concept spreads in civil domains suchas crisis management or logistic systems. More precisely, a SoS is a complex system characterizedby the particular nature of its components: these latter, which are systems, tend tobe managerially and operationally independent as well as geographically distributed. Thisspecific characterization led to re-think research areas of classic SE such as definition, taxonomy,modeling, architecting and so on. SoS architecting focuses on the way independentcomponents of a SoS can be dynamically structured and can change autonomously theirinteractions in an efficient manner to fulfill the goal of the SoS and to cope with the highdynamics of the environment. This PhD thesis mainly focuses on two SoS research areas: 1)SoS modeling and 2) SoS architecting. To achieve the first point, we propose a new modelcalled SApHESIA (SoS Architecting HEuriStIc based on Agent). We have used set theoryand ABM (Agent-Based Model) paradigm to define this model that takes into account thecharacteristics of SoS. Secondly, we propose a new SoS architecting procedure based on theAdaptive Multi-Agent System (AMAS) approach that advocates full cooperation betweenall the components of the SoS through the concept of criticality. This criticality is a metricthat represents the distance between the current state of a component and its goals. In thisprocedure, the SoS architecture evolves over time to self-adapt to the dynamics of the environmentin which it is plunged, while taking into account the respective local goals of itscomponents. Finally we instantiate this model and this procedure through 4 examples fromdifferent domains (military, logistics and exploratory missions) and validate the feasibility,the efficiency, the effectiveness and the robustness of the SoS architecting procedure we havedeveloped and proposed
Libros sobre el tema "Systèmes fog"
Capelle, Guy. Système: Méthode de français pour débutants. Manuel. Burnt Harlow, Essex, Eng: Longman, 1985.
Buscar texto completoOntario. Esquisse de cours 12e année: Systèmes informatiques ice4e cours préemploi. Vanier, Ont: CFORP, 2002.
Buscar texto completoOntario. Esquisse de cours 12e année: Systèmes informatiques ice4m cours préuniversitaire. Vanier, Ont: CFORP, 2002.
Buscar texto completoInternational Institute of Human Rights. La réforme du système de contrôle contentieux de la Convention européenne des droits de l'homme: (le Protocole no 14 et les recommandations et résolutions du Comité des ministres) : actes du séminaire. Bruxelles: Nemesis, 2005.
Buscar texto completoBlaise, Clark. Time lord: The remarkable Canadian who missed his train, and changed the world. Toronto, Ont: Knopf, 2000.
Buscar texto completoBlaise, Clark. Time lord: The remarkable Canadian who missed his train and changed the world. Toronto: A.A. Knopf Canada, 2001.
Buscar texto completoRedl, Siegmund M. GSM and personal communications handbook. Boston: Artech House, 1998.
Buscar texto completoServices, Dowrich Management. Police and youth, "looking to the future" : executive summary of the final report of pilot project police/youth mentoring program =: La police et les jeunes "un regard vers l'avenir" : sommaire du rapport final du projet pilote du Programme d'encadrement des jeunes par la police. Ottawa, Ont: Solicitor General Canada = Solliciteur général Canada, 1994.
Buscar texto completoSteve, Dowrich, Dowrich Management Services, Canada Solicitor General Canada y Ontario. Ministry of the Solicitor General and Correctional Services., eds. "Looking to the future": Final report of the Pilot Project Police/Youth Mentoring Program. [Ottawa]: Solicitor General Canada, 1993.
Buscar texto completoRoman, Steven. Win32 API programming with Visual Basic. Sebastopol, CA: O'Reilly, 2000.
Buscar texto completoCapítulos de libros sobre el tema "Systèmes fog"
Hudrisier, H. "Sémiotique et ergonomie d’un système documentaire-image interactif". En Foundations of Semiotics, 407. Amsterdam: John Benjamins Publishing Company, 1989. http://dx.doi.org/10.1075/fos.18.37hud.
Texto completoGunawan, Rachmat, Angélique Rouhan, Adrien Aubert, Richard Audoire, Bastiaan Vink, Baldassare Messina y Jorinus Kalis. "Ship Performance and Energy Consumption Evaluation Based on Modular Design Approach". En Lecture Notes in Mobility, 574–79. Cham: Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-89444-2_84.
Texto completoMoore, Nicholas, Patrick Blin, Régis Lassalle, Nicolas Thurin, Pauline Bosco-Levy y Cécile Droz. "National Health Insurance Claims Database in France (SNIRAM), Système Nationale des Données de Santé (SNDS) and Health Data Hub (HDH)". En Databases for Pharmacoepidemiological Research, 131–40. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-51455-6_10.
Texto completoRenzi, Pietro y Alberto Franci. "EGIPSS model for the evaluation of performance in healthcare". En Proceedings e report, 167–72. Florence: Firenze University Press, 2021. http://dx.doi.org/10.36253/978-88-5518-461-8.32.
Texto completo"L'informatisation des systèmes documentaires". En French for Marketing, 181–94. Cambridge University Press, 1998. http://dx.doi.org/10.1017/cbo9780511620959.017.
Texto completoGrellard, Christophe. "Chapitre II. Le système de la foi chez Guillaume d’Ockham". En De la certitude volontaire, 63–86. Éditions de la Sorbonne, 2014. http://dx.doi.org/10.4000/books.psorbonne.98585.
Texto completo"B2: Units: The Système International". En BIOS Instant Notes in Mathematics and Statistics for Life Scientists, 12–15. Taylor & Francis, 2004. http://dx.doi.org/10.1201/9780203488263-7.
Texto completoMonk, Paul y Lindsey J. Munro. "Dimensional analysis". En Maths for Chemistry. Oxford University Press, 2021. http://dx.doi.org/10.1093/hesc/9780198717324.003.0036.
Texto completo"SI units (Système International d'Unités) and their Abbreviations". En Writing for Science and Engineering, 268–70. Elsevier, 2000. http://dx.doi.org/10.1016/b978-075064636-9/50021-5.
Texto completoReed, Martin B. "Units; precision and accuracy". En Core Maths for the Biosciences. Oxford University Press, 2011. http://dx.doi.org/10.1093/hesc/9780199216345.003.0003.
Texto completoActas de conferencias sobre el tema "Systèmes fog"
Assaud, Loïc. "Le stockage de l'énergie électrique dans les batteries à ions lithium. Une histoire d'interfaces". En MOlecules and Materials for the ENergy of TOMorrow. MSH Paris-Saclay Éditions, 2021. http://dx.doi.org/10.52983/ohqv8601.
Texto completoAukauloo, Ally. "S'inspirer de la nature pour produire de l'énergie. Photosynthèse artificielle à l'Université Paris-Saclay". En MOlecules and Materials for the ENergy of TOMorrow. MSH Paris-Saclay Éditions, 2021. http://dx.doi.org/10.52983/nova3845.
Texto completoLe Baut-Ferrarese, Bernadette. "La transition énergétique : enjeux juridiques. Partie 1 : La transition énergétique à l'épreuve du droit". En MOlecules and Materials for the ENergy of TOMorrow. MSH Paris-Saclay Éditions, 2021. http://dx.doi.org/10.52983/npyt7969.
Texto completoKogo, Bridget, Bin Wang, Luiz Wrobel y Mahmoud Chizari. "Thermal Analysis of Girth Welded Joints of Dissimilar Metals in Pipes With Varying Clad Thicknesses". En ASME 2017 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/pvp2017-66272.
Texto completoBrunet, Philippe. "La fraude scientifique : une affaire de morale ou de système ?" En 2ème Colloque International de Recherche et Action sur l’Intégrité Académique. « Les nouvelles frontières de l’intégrité ». IRAFPA, 2022. http://dx.doi.org/10.56240/cmb9906.
Texto completoEnsbury, Theodor, Alessandro Picarelli y Mike Dempsey. "High-fidelity multiphysics FCEV bus study with detailed HVAC, cabin, and hydrogen fuel cell models". En Asian Modelica Conference 2022, Tokyo, Japan, November 24-25, 2022. Linköping University Electronic Press, 2022. http://dx.doi.org/10.3384/ecp19347.
Texto completoEnsbury, Theodor, Alessandro Picarelli y Mike Dempsey. "High-Fidelity Multiphysics FCEV bus study with detailed HVAC, cabin, and Hydrogen Fuel Cell models". En Asian Modelica Conference 2022, Tokyo, Japan, November 24-25, 2022. Linköping University Electronic Press, 2022. http://dx.doi.org/10.3384/ecp19353.
Texto completoWilliams, Deasn S. "Do Your Measures Measure Up? Using Key Performance Indicator to Drive Operational Effectiveness". En NCSL International Workshop & Symposium. NCSL International, 2015. http://dx.doi.org/10.51843/wsproceedings.2015.29.
Texto completoChakraborty, Arindam, Satish Krishnasamy Radha, Kadir C. Sener y Amit H. Varma. "Reliability Based Design Optimization of Primary Shield Structure Consisting of Steel-Plate Composite (SC) Walls Under Seismic Load". En ASME 2017 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/pvp2017-66133.
Texto completoOsloub, Ehsan y Sean S. Teller. "Solution Verification Study for Finite Element Analysis of PLLA Stent Implantation". En ASME 2024 Verification, Validation, and Uncertainty Quantification Symposium. American Society of Mechanical Engineers, 2024. http://dx.doi.org/10.1115/vvuq2024-132962.
Texto completoInformes sobre el tema "Systèmes fog"
Lamontagne, M. Développement d'un système d'alerte précoce pour les tremblements de terre du Québec. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/328951.
Texto completoDudley, J. P. y S. V. Samsonov. Système de traitement automatisé du gouvernement canadien pour la détection des variations et l'analyse des déformations du sol à partir des données de radar à synthèse d'ouverture de RADARSAT-2 et de la mission de la Constellation RADARSAT : description et guide de l'utilisateur. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/329134.
Texto completoLanglais, Pierre-Carl. Infrastructures de science ouverte. Comité pour la science ouverte, 2024. https://doi.org/10.52949/76.
Texto completoGestion de la pandémie de COVID-19 - Analyse de la dotation en personnel dans les centres d'hébergement de soins de longue durée du Québec au cours de la première vague. CIRANO, junio de 2023. http://dx.doi.org/10.54932/fupo1664.
Texto completo