• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 63
  • 19
  • 12
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 142
  • 24
  • 19
  • 19
  • 16
  • 16
  • 15
  • 15
  • 15
  • 15
  • 15
  • 14
  • 13
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Etude de la déformation de gouttes à interface et rhéologie complexes / Etude de la déformation de gouttes à interface et rhéologie complexes

Boufarguine, Majdi 07 June 2011 (has links)
Ce travail de thèse est une contribution à l’étude des émulsions de Pickering qui ont vu unregain d’intérêt ces dernières années. Bien que l’effet Pickering ait été décrit depuis plus d’un siècle,des études plus systématiques pour comprendre l’activité des particules solides aux interfacesliquide/liquide n’est que partiellement entrepris, surtout en cours de déformation. Plusieurs questionsrestent d’actualité et, en premier, la localisation même des particules à l’interface et le mécanismed’adsorption associé.L’approche proposée dans ce travail de thèse s’inscrit dans cette optique avec en particulier laconsidération d’un événement élémentaire d’une émulsion : une goutte isolée dans une matrice etexaminée suite à un saut de déformation en cisaillement dans un dispositif de cisaillement contrarotatifdéveloppé à PCI. De manière générique, le but est de comprendre la relation entre le comportement dela goutte et la rhéologie complexe (en volume ou en surface) apportée par la dynamique de particulessolides aux interfaces liquide/liquide mobiles. Plusieurs paramètres ont été étudiés en commençant parl’affinité chimique des particules solides avec les phases liquides, la rhéologie des phases liquides, laconcentration et la taille des particules solides ; et pour finir, une attention particulière a été portée àl'effet de la déformation macroscopique et l’âge de la goutte.Plus particulièrement, la mise en évidence de la synergie entre la déformation macroscopiqueet l’âge de la goutte, sur la dynamique d’adsorption des particules à l’interface liquide/liquide et lastructuration de l’interface composée, a permis de proposer une méthodologie pour la modulation de« l’effet mémoire induite par la déformation » lors de la relaxation de la goutte en modifiant lasurface des particules par adsorption de tensioactifs choisis. Ainsi, il a été possible de figer les gouttesliquides dans des formes anisotropes contrôlées. Ce phénomène a été corrélé à une transition liquidesolidede l’interface composée mise en évidence par des mesures des modules rhéologiquesinterfaciaux. Ces derniers ont été, par ailleurs, reliés quantitativement à l’anisotropie des gouttesfigées. / This thesis is a contribution to the study of Pickering emulsions that have seen a renewedinterest in recent years. Although the effect Pickering has been described for over a century, moresystematic studies to understand the activity of solid particles at liquid/liquid interfaces is onlypartially undertaken, especially during flow. Several issues are still relevant and, in particular, thelocation of particles at the interface and the involved adsorption mechanism.The approach proposed in this thesis is to consider an elementary event of an emulsion: asingle droplet in a matrix undergoing a strain jump in a shear flow. This experiment was performed ina counter-rotating shear device developed at PCI. Generically, the aim is to understand the relationshipbetween the behavior of the droplet and the bulk and interfacial rheology induced by the dynamics ofsolid particles at a liquid/liquid interfaces. Several parameters were studied starting with the chemicalaffinity of solid particles with the liquid phases, the rheology of the liquid phases, the concentrationand the size of solid particles, and finally, special attention was paid to the effect of macroscopicdeformation and the age of the interface.More specifically, the demonstration of synergy between the macroscopic strain and the age ofthe interface, the dynamic adsorption of particles at the liquid/liquid interface and the structure of theinterface, allowed to propose a methodology for the modulation of the "memory effect induced by thedeformation" during the relaxation of the droplet by changing the particle surface using the adsorptionof a selected surfactants. Thus, it was possible to freeze the liquid drops in a controlled anisotropicshapes. This phenomenon was correlated to a liquid-solid transition of the interface demonstrated byrheological measurements of the interfacial moduli. These were, moreover, quantitatively related tothe anisotropy of frozen droplets.
72

A game theoretic analysis of adaptive radar jamming

Bachmann, Darren John Unknown Date (has links) (PDF)
Advances in digital signal processing (DSP) and computing technology have resulted in the emergence of increasingly adaptive radar systems. It is clear that the Electronic Attack (EA), or jamming, of such radar systems is expected to become a more difficult task. The reason for this research was to address the issue of jamming adaptive radar systems. This required consideration of adaptive jamming systems and the development of a methodology for outlining the features of such a system is proposed as the key contribution of this thesis. For the first time, game-based optimization methods have been applied to a maritime counter-surveillance/counter-targeting scenario involving conventional, as well as so-called ‘smart’ noise jamming.Conventional noise jamming methods feature prominently in the origins of radar electronic warfare, and are still widely implemented. They have been well studied, and are important for comparisons with coherent jamming techniques.Moreover, noise jamming is more readily applied with limited information support and is therefore germane to the problem of jamming adaptive radars; during theearly stages when the jammer tries to learn about the radar’s parameters and its own optimal actions.A radar and a jammer were considered as informed opponents ‘playing’ in a non-cooperative two-player, zero-sum game. The effects of jamming on the target detection performance of a radar using Constant False Alarm Rate (CFAR)processing were analyzed using a game theoretic approach for three cases: (1) Ungated Range Noise (URN), (2) Range-Gated Noise (RGN) and (3) False-Target (FT) jamming.Assuming a Swerling type II target in the presence of Rayleigh-distributed clutter, utility functions were described for Cell-Averaging (CA) and Order Statistic (OS) CFAR processors and the three cases of jamming. The analyses included optimizations of these utility functions, subject to certain constraints, with respectto control variables (strategies) in the jammer, such as jammer power and spatial extent of jamming, and control variables in the radar, such as threshold parameter and reference window size. The utility functions were evaluated over the players’ strategy sets and the resulting matrix-form games were solved for the optimal or ‘best response’ strategies of both the jammer and the radar.
73

A game theoretic analysis of adaptive radar jamming

Bachmann, Darren John Unknown Date (has links) (PDF)
Advances in digital signal processing (DSP) and computing technology have resulted in the emergence of increasingly adaptive radar systems. It is clear that the Electronic Attack (EA), or jamming, of such radar systems is expected to become a more difficult task. The reason for this research was to address the issue of jamming adaptive radar systems. This required consideration of adaptive jamming systems and the development of a methodology for outlining the features of such a system is proposed as the key contribution of this thesis. For the first time, game-based optimization methods have been applied to a maritime counter-surveillance/counter-targeting scenario involving conventional, as well as so-called ‘smart’ noise jamming.Conventional noise jamming methods feature prominently in the origins of radar electronic warfare, and are still widely implemented. They have been well studied, and are important for comparisons with coherent jamming techniques.Moreover, noise jamming is more readily applied with limited information support and is therefore germane to the problem of jamming adaptive radars; during theearly stages when the jammer tries to learn about the radar’s parameters and its own optimal actions.A radar and a jammer were considered as informed opponents ‘playing’ in a non-cooperative two-player, zero-sum game. The effects of jamming on the target detection performance of a radar using Constant False Alarm Rate (CFAR)processing were analyzed using a game theoretic approach for three cases: (1) Ungated Range Noise (URN), (2) Range-Gated Noise (RGN) and (3) False-Target (FT) jamming.Assuming a Swerling type II target in the presence of Rayleigh-distributed clutter, utility functions were described for Cell-Averaging (CA) and Order Statistic (OS) CFAR processors and the three cases of jamming. The analyses included optimizations of these utility functions, subject to certain constraints, with respectto control variables (strategies) in the jammer, such as jammer power and spatial extent of jamming, and control variables in the radar, such as threshold parameter and reference window size. The utility functions were evaluated over the players’ strategy sets and the resulting matrix-form games were solved for the optimal or ‘best response’ strategies of both the jammer and the radar.
74

Détection robuste et précoce de l’embarquement et du grippage dans le système de commandes de vol / Robust and early detection of control surface runaway and jamming in the Electrical Flight Control System

Gheorghe, Anca 26 June 2013 (has links)
Cette thèse CIFRE est réalisée dans le cadre d’un partenariat entre le laboratoire IMS de l’Université Bordeaux I et Airbus Operations S.A.S à Toulouse. Le thème abordé concerne la détection robuste et précoce de deux types particuliers de pannes dans le système de commandes de vol, à savoir l’embarquement et le grippage des gouvernes de profondeur. Afin de contribuer à l’optimisation du design structural des futurs avions, l’objectif est de proposer des méthodes capables d’améliorer les performances en détection des techniques actuellement en place, tout en garantissant un haut niveau de robustesse. Trois stratégies de surveillance à base de modèle sont présentées. La première solution est basée sur un filtre de Kalman dédié, associé à une procédure d’optimisation de ses paramètres. La seconde technique est basée sur un test de décision appliqué dans l’espace paramétrique, à une direction sensible identifiée. Finalement, une troisième approche consiste à utiliser un différentiateur à modes glissants pour estimer les dérivées du signal d’entrée et de sortie de la boucle d’asservissement. Les méthodes développées ont été implémentées dans le calculateur de commandes de vol et validées sur les bancs de tests Airbus et même en vol. Les résultats expérimentaux ont clairement mis en évidence l’apport des techniques présentées dans cette thèse par rapport à l’état de l’art industriel. / The research work done in this PhD has been carried out under an industrial convention (CIFRE) between the IMS laboratory (Bordeaux University, France) and Airbus Operations S.A.S. (Toulouse, France). The thesis deals with two important Electrical Flight Control System failure cases: runaway (a.k.a. hard over) and jamming (or lock-in-place failure) of aircraft control surfaces. Early and robust detection of such failures is an important issue for achieving sustainability goals and for early system reconfiguration. The thesis focuses on the elevator runaway and jamming. Three model-based monitoring strategies are presented. The first approach is based on a dedicated Kalman filtering with optimised tuning parameters. The second method is based on a decision test applied to an identified sensitive direction in the parametric space. Finally, the third solution is based on a sliding mode differentiator. The techniques have been implemented in the flight control computer and validated on Airbus test facilities and during real flight tests. The experimental results confirmed that good level of performance and robustness can be obtained.
75

Détection d'attaques dans un système WBAN de surveillance médicale à distance / Attacks detection in a WBAN system for remote medical monitoring

Makke, Ali 30 May 2014 (has links)
L'un des défis majeurs du monde de ces dernières décennies a été l'augmentation continue de la population des personnes âgées dans les pays développés. D’où la nécessité de fournir des soins de qualité à une population en croissance rapide, tout en réduisant les coûts des soins de santé. Dans ce contexte, de nombreux travaux de recherche portent sur l’utilisation des réseaux de capteurs sans fil dans les systèmes WBAN (Wireless Body Area Network), pour faciliter et améliorer la qualité du soin et de surveillance médicale à distance. Ces réseaux WBAN soulèvent de nouveaux défis technologiques en termes de sécurité et de protection contre les anomalies et les attaques. Le mode de communication sans fil utilisé entre ces capteurs et l’unité de traitement accentue ces vulnérabilités. En effet les vulnérabilités dans un système WBAN se décomposent en deux parties principales. La première partie se compose des attaques possibles sur le réseau des capteurs médicaux et sur le médium de communications sans fils entre ces capteurs et l’unité de traitement. La deuxième partie se compose des attaques possibles sur les communications à haut débit entre le système WBAN et le serveur médical. L’objectif de cette thèse est de répondre en partie aux problèmes de détection des attaques dans un système WBAN de surveillance médicale à distance. Pour atteindre cet objectif, nous avons proposé un algorithme pour détecter les attaques de brouillage radio (jamming attack) qui visent le médium de communications sans fils entre les capteurs et l’unité de traitement. Ainsi nous avons proposé une méthode de mesure de divergence pour détecter les attaques de type flooding qui visent les communications à haut débit entre le système WBAN et le serveur médical. / One of the major challenges of the world in recent decades is the continued increase in the elderly population in developed countries. Hence the need to provide quality care to a rapidly growing population while reducing the costs of health care is becoming a strategic challenge. In this context, many researches focus on the use of wireless sensor networks in WBAN (Wireless Body Area Network) systems to facilitate and improve the quality of medical care and remote monitoring. These WBAN systems pose new technological challenges in terms of security and protection against faults and attacks. The wireless communication mode used between the sensors and the collection node accentuates these vulnerabilities. Indeed vulnerabilities in a WBAN system are divided into two main parts. The first part consists of the possible attacks on the network of medical sensors and on the wireless communications medium between the sensors and the processing unit. The second part consists of possible attacks on high-speed communications between the WBAN system and the medical server. The objective of this thesis is to meet some of the problems of detecting attacks in a WBAN system for remote medical monitoring. To achieve this goal, we propose an algorithm to detect the jamming attacks targeting the wireless communications medium between the sensors and the processing unit. In addition we propose a method of measuring divergence to detect the flooding attacks targeting the high-speed communications between the WBAN system and the medical server.
76

Obfuscation of Transmission Fingerprints for Secure Wireless Communications

Rahbari, Hanif January 2016 (has links)
Our world of people and objects is on the verge of transforming to a world of highly-interconnected wireless devices. Incredible advances in wireless communications, hardware design, and power storage have facilitated hasty spread of wireless technologies in human life. In this new world, individuals are often identified and reached via one or multiple wireless devices that they always carry (e.g., smartphones, smart wearable, implantable medical devices, etc.), and their biometrics identities are replaced by their digital fingerprints. In near future, vehicles will be controlled and monitored via wireless monitoring systems and various physical objects (e.g., home appliance and retail store items) will be connected to the Internet. The list of these changes goes on. Unfortunately, as different aspects of our lives are being immerged in and dependent to wireless devices and services, we will become more vulnerable to wireless service/connection interruptions due to adversarial behavior and our privacy will become more potent to be exposed to adversaries. An adversary can learn the procedures of a wireless system and analyze its stages, and accordingly, launch various attacks against the operations of the system or the privacy of the people. Existing data confidentiality and integrity services (e.g., advanced encryption algorithms) have been able to prevent the leakage of users' messages. However, in wireless networks, even when upper-layer payloads are encrypted, the users' privacy and the operation of a wireless network can be threatened by the leakage of transmission attributes at the physical (PHY) layer. Examples of these attributes are payload size, frequency offset (FO), modulation scheme, and the transmission rate. These attributes can be exploited by an adversary to launch passive or active attacks. A passive attacker may learn about the interests, sexual orientation, political views, and patentable ideas of the user through analyzing these features, whereas an active attacker exploits captured attributes to launch selective packet jamming/dropping and disrupt wireless services. These call for novel privacy preserving techniques beyond encryption. In this dissertation, we study the vulnerability of current wireless systems to the leakage of transmission attributes at the PHY layer and propose several schemes to prevent it. First, we design and experimentally demonstrate with USRPs an energy-efficient and highly disruptive jamming attack on the FO estimation of an OFDM system. OFDM is the core multiplexing scheme in many modern wireless systems (e.g., LTE/5G and 802.11a/n/ac) and is highly susceptible to FO. FO is the difference in the operating frequencies of two radio oscillators. This estimation is done by the receiver using the publicly-known frame preamble. We show that the leakage of FO value via the preamble can facilitate an optimally designed jamming signal without needing to know the channel between the transmitter and the legitimate receiver. Our results show that the jammer can guarantee a successful attack even when its power is slightly less than the transmitter's power. We then propose four mitigation approaches against the proposed FO attack. Next, we consider certain transmission attributes that are disclosed via unencrypted PHY/MAC headers. Example of these attributes are payload size, transmission rate, and MAC addresses. Beyond unencrypted headers, the adversary can estimate the frame size and transmission rate through identifying the payload's modulation scheme and measuring the transmission time. To prevent the leakage of these attributes, we propose Friendly CryptoJam scheme, which consists of three components: First, a modulation-aware encryption scheme to encrypt the headers. Second, an efficient modulation obfuscation techniques. Specifically, the proposed modulation obfuscation scheme embeds the modulation symbols of a frame's payload into the constellation of the highest-order modulation scheme supported by the system. Together with effective PHY/MAC header encryption at the modulation level, the proposed obfuscation scheme hides the transmission rate, payload size, and other attributes announced in the headers while avoiding any BER performance loss. Compared with prior art, Friendly CryptoJam enjoys less complexity and less susceptibility to FO estimation errors. The third component is a novel PHY-level identification method. To facilitate PHY/MAC header encryption when a MAC layer sender identifier cannot be used (e.g., due to MAC address encryption), we propose two preamble-based sender identification methods, one for OFDM and one for non-OFDM systems. A sender identifier is special message that can be embedded in the frame preamble. The extent of the applications of our embedding scheme goes beyond identifier embedding and include embedding part of the data frame, the sender's digital signature, or any meta-data that the sender provides. Our message embedding method can further be used to mitigate the FO estimation attack because the jammer can no longer optimize its jamming signal with respect to a fixed preamble signal. In addition, we considered friendly jamming technique in a multi-link/hop network to degrade the channels of the eavesdroppers and prevent successful decoding of the headers, while minimizing the required jamming power by optimally placing the friendly jamming devices.
77

Interfaces à grains, et autres situations de mouillage nul

Lagubeau, Guillaume 08 January 2010 (has links) (PDF)
Intercaler une phase intermédiaire (gazeuse ou granulaire) entre une goutte et une surface crée une situation de mouillage nul. Nous étudions expérimentalement les conséquences de la présence de cette phase sur le mouvement des gouttes d'eau. Dans une première partie, nous nous intéressons à des situations de non-mouillage induites par la présence d'un film gazeux entre le liquide et la surface. Une conséquence de la présence de ce film est la mise en mouvement d'une goutte en caléfaction sur une surface chaude de profil périodique et asymétrique (en forme de toit d'usine). Nous mettons en évidence que l'écoulement asymétrique du gaz dans le film de vapeur entre la goutte et la surface provoque la propulsion de la goutte par effet fusée. À l'inverse, la faible épaisseur du film isolant peut induire une dissipation visqueuse supplémentaire que l'on observe par exemple lors du rebond d'une bulle de savon sur un liquide. La deuxième partie de ce travail est consacrée à une autre situation de non-mouillage réalisée par l'ajout de grains à la surface d'une goutte (appelée goutte enrobée). On forme alors une interface composite, à la fois capillaire et granulaire qui peut présenter un caractère fortement dissipatif : lorsque la densité de grains est faible, son comportement est celui du liquide qui la compose mais lorsque la densité de grains à la surface approche des densités du jamming, caractère granulaire de l'interface l'emporte. Le frottement entre grains détermine alors la forme ainsi que la dynamique des gouttes enrobées. Nous montrons que la rhéologie de ces interfaces est alors similaire à celle des écoulements granulaires denses.
78

Performance evaluation of C-ACC/platooning under ITS-G5 communications

Lyamin, Nikita January 2016 (has links)
Intelligent Transport Systems (ITS) are aiming to provide innovative services related to different modes of transport and traffic management, and enable various users to be better informed and make safer, more coordinated and smarter use of transport networks. Cooperative-ITS (C-ITS) support connectivity between vehicles, vehicles and roadside infrastructure, traffic signals as well as with other road users. In order to enable vehicular communications European Telecommunication Standards Institute (ETSI) delivered ITS-G5 -- a of set of C-ITS standards. Considering the goals of C-ITS, inter-vehicle communications should be reliable and efficient. In this thesis we study the performance, efficiency, and dependability of ITS-G5 communications for Cooperative adaptive cruise control (C-ACC) and platooning C-ITS applications. We provide an overview of currently available and ongoing standardization targeting communications in C-ACC/platooning. We study the performance of ITS-G5 beaconing in a C-ACC/platooning scenario, where we show that its performance may deteriorate when implemented in cooperative driving applications due to the kinematic-dependent design of the message triggering mechanism. We explain in detail the cause of this phenomenon and test it for a wide range of parameters. Also, we study the influence of different available ITS-G5 legitimate setups on the C-ACC/platooning fuel efficiency and demonstrate that proper communication setup may enhance fuel savings. This thesis also proposes a jamming denial-of-service attack detection algorithm for platooning. The main advantage of our detector is its short learning phase that not exceed a second and low detection delay of a few hundreds of milliseconds. Under some assumptions, the proposed algorithm demonstrates the ability to detect certain types of attacks with average probability above 0.9. / ACDC
79

Signal Processing for Radar with Array Antennas and for Radar with Micro-Doppler Measurements

Björklund, Svante January 2017 (has links)
Radar (RAdio Detection And Ranging) uses radio waves to detect the presence of a target and measure its position and other properties. This sensor has found many civilian and military applications due to advantages such as possible large surveillance areas and operation day and night and in all weather. The contributions of this thesis are within applied signal processing for radar in two somewhat separate research areas: 1) radar with array antennas and 2) radar with micro-Doppler measurements. Radar with array antennas: An array antenna consists of several small antennas in the same space as a single large antenna. Compared to a traditional single-antenna radar, an array antenna radar gives higher flexibility, higher capacity, several radar functions simultaneously and increased reliability, and makes new types of signal processing possible which give new functions and higher performance. The contributions on array antenna radar in this thesis are in three different problem areas. The first is High Resolution DOA (Direction Of Arrival) Estimation (HRDE) as applied to radar and using real measurement data. HRDE is useful in several applications, including radar applications, to give new functions and improve the performance. The second problem area is suppression of interference (clutter, direct path jamming and scattered jamming) which often is necessary in order to detect and localize the target. The thesis presents various results on interference signal properties, antenna geometry and subarray design, and on interference suppression methods. The third problem area is measurement techniques for which the thesis suggests two measurement designs, one for radar-like measurements and one for scattered signal measurements. Radar with micro-Doppler measurements: There is an increasing interest and need for safety, security and military surveillance at short distances. Tasks include detecting targets, such as humans, animals, cars, boats, small aircraft and consumer drones; classifying the target type and target activity; distinguishing between target individuals; and also predicting target intention. An approach is to employ micro-Doppler radar to perform these tasks. Micro-Doppler is created by the movement of internal parts of the target, like arms and legs of humans and animals, wheels of cars and rotors of drones. Using micro-Doppler, this thesis presents results on feature extraction for classification; on classification of targets types (humans, animals and man-made objects) and human gaits; and on information in micro-Doppler signatures for re-identification of the same human individual. It also demonstrates the ability to use different kinds of radars for micro-Doppler measurements. The main conclusion about micro-Doppler radar is that it should be possible to use for safety, security and military surveillance applications.
80

Theory of fluctuations in disordered systems / Théorie des fluctuations dans les systèmes désordonnés

Urbani, Pierfrancesco 04 February 2014 (has links)
Dans cette thèse nous avons étudié de nombreux aspects de la théorie des systèmes désordonnés. En particulier, nous avons étudié les systèmes vitreux. La description détaillée des systèmes désordonnés et vitreux est un problème ouvert en physique de la matière condensée. Dans le cadre de la théorie de champ moyen pour les verres structuraux nous avons étudié la théorie des fluctuations proche de la transition vitreuse dynamique. L’étude des fluctuations peut etre fait avec le formalisme statique de la théorie de répliques. Nous avons fait cela en introduisant une théorie des champs pour la transition vitreuse à partir du potentiel microscopique entre les particules. Nous avons étudié dans ce cadre les fluctuations au niveau gaussien et nous avons évalués les exposants critiques dans ces approximations. Nous avons aussi étudié la région de validité de la prédiction gaussienne avec l’introduction d’un critère de Ginzburg pour la transition vitreuse. Les résultats que nous avons obtenues ne sont valides que dans la région β. Pour obtenir des resultats dans la région α nous avons étudié la pseudodynamique de Boltzmann que a été introduit par Franz and Parisi. Nous sommes parti des équations de Ornstein-Zernike et nous avons obtenu un ensemble d’équations dynamiques. En utilisant l’approximation Hypernetted Chain nous avons obtenu un ensemble complet d’équations qui sont très similaires aux équations de la théorie de mode-coupling. La troisième partie de la thèse porte sur l’étude des états amorphes des sphères dures en hautes dimensions. Pour obtenir les exposants dynamique dans ce cas, nous avons étudié la stabilité du diagramme de phase 1RSB (one-step-replica-symmetry-breaking). Nous avons découvert que ce diagramme de phase possède une région où la solution 1RSB est instable. La région où la solution 1RSB est instable est connectée avec la description théorique de la physique de jamming des sphères dures et nous avons montré que l’instabilité 1RSB est responsable d’une transition de phase en haute densité. Cette transition s’appelle la transition de Gardner. Nous avons cherché une solution 2RSB et nous avons vu qu’il existait un point en densité après lequel on peut avoir une solution 2RSB (et aussi fullRSB). Nous avons étudié le diagramme de phase 2RSB dans la limite de jamming où la pression devient infini. Après la solution 2RSB nous avons cherché à décrire la solution fullRSB. Nous avons écrit les équations fullRSB et nous avons découvert qu’elles sont identiques aux equations que l’on a dans le cas de un modèle de verres de spins qui s’appelle modèle de Sherrington et Kirkpatrick. Nous avons aussi étudié la solution numerique des équations fullRSB dans la limite de jamming. Cette solution montre beaucoup des choses intéressantes. La plus importante est le comportement du mean square displacement dans la limite de jamming. Si l’on regard les résultats numériques et éxperimentaux, il semble que le plateau de le mean square displacement s’approche a zero comme la pression à un exposant proche de −3/2. Nous avons vu que la solution numérique des équations fullRSB est en mesure de reproduire ce comportement. La quatrième partie de la thése a porté sur la dynamique de mode-coupling dans le régime où la transition vitreuse devient continue. / In this thesis we have studied many aspects of the physics of disordered and glassy systems. The first part of the work is about the theory of dynamical fluctuations in the beta regime. When a system undergoes a dynamical arrest, it can be studied by introducing an appropriate dynamical correlation function that plays the role of the order parameter of the transition. To understand the collective effects underlying the glass transition we have studied the fluctuations of the order parameter on a time scale where the system is relaxed in a typical metastable glassy state. To do this we have seen that coming from the glass phase the system develops critical fluctuations with a diverging correlation length at the mean field level. We have thus derived an effective field theory by focusing only on them. This field theory can be used firstly to derive the mode-coupling exponent parameter that controls the relaxation of the dynamical correlation function when the system relaxes in a metastable glassy state. Moreover we can give a Ginzburg Criterion that can be used to determine the region of validity of the Gaussian approximation. These considerations are valid in the beta regime. To clarify what happens in the alpha regime we have studied a quasi-equilibrium construction, called Boltzmann-Pseudodynamics, recently introduced in order to describe with static techniques the long time regime of glassy dynamics. We have extended this formalism to structural glasses by producing a new set of dynamical equations. We have done this in the simplest approximation scheme that is called Hypernetted Chain. Two results have been obtained : firstly, we have computed the mode-coupling exponent parameter and we have shown that it coincides with the one obtained with the formalism of the first part of the thesis ; secondly we have studied the aging regime and we have derived that the condition that determines the fluctuation-dissipation ratio is a marginal stability one. In the third part of the thesis we have studied the theory of amorphous states of hard spheres in high dimensions. Hard spheres provide simple models of glasses and they are extensively studied for the jamming transition. In our framework jammed states can be thought as infinite pressure limit of metastable glassy states. During the last years it has been derived a mean field theory of hard spheres based on the 1RSB assumption on the structure of the free energy landscape. However it has been realized that this construction is inconsistent for what concerns the property of the packings at jamming. In the present work we have firstly investigated the possibility of an instability of the 1RSB solution and we have actually found that the 1RSB solution is unstable in the jamming part of the phase diagram. At the same time we have been able to compute the mode-coupling exponent parameter for this system. In order to go beyond the 1RSB solution we have first tried a 2RSB ansatz and then a fullRSB solution. We have derived a set of variational equations that are very close to the ones that have been derived in the Sherrington-Kirkpatrick model. We have solved numerically the equations and we have shown that the fullRSB solution seems to predict that the plateau value of the mean square displacement scale as the pressure to a power close to 3/2 as it seems to be predicted by scaling arguments and in contrast with the 1RSB predictions that show a scaling with the inverse of the pressure. The last chapter of the thesis is on the mode-coupling theory when the glass transition is becoming continuous. We have been able to show that in such a situation a detailed characterization of the solution of the equations can be obtained in the long time regime.

Page generated in 0.0571 seconds