932 resultados para cooperative car following model
Resumo:
A detailed sedimentological and paleontological analysis of the uppermost Miocene (Messinian)–Pliocene boundary at the northern border of the Bajo Segura Basin, southeastern Spain, was carried out in order to describe the evolution of the regional paleocoastline during the Pliocene reflooding of the Mediterranean immediately after the sea-level fall related to the Messinian Salinity Crisis. Multiple trace fossils typical of firm- and hardgrounds were recognized, allowing identification of Glossifungites (two different types), Entobia, and Gnathichnus ichnofacies. Trace-fossil analysis showed that lithology and media consistency exerted considerable control on the development of the different ichnocoenoses and that there was a clear decrease in hydrodynamic energy from a coastal to a shallow-water shelf environment related to progressive sea-level rise. Ichnological and sedimentological data provide evidence that the definitive flooding of the Mediterranean was rapid and synchronous throughout the northern margin of the Bajo Segura Basin. The following model for the Pliocene transgression in the study area is therefore proposed: (1) the marine ingression penetrated along the incised paleovalleys carved as a consequence of the fall in sea level, where the first two Pliocene systems were deposited (P0–P1); (2) during the maximum flooding surface of the transgression, the sea overflowed the margins of the paleovalleys and extended throughout the entire northern margin of the basin; and (3) the third Pliocene system was deposited, forming the lower part of a highstand systems tract (P2).
Resumo:
Bolt, Beranek and Newman, Inc., Van Nuys, Calif.
Resumo:
Mode of access: Internet.
Resumo:
National Highway Traffic Safety Administration, Washington, D.C.
Resumo:
The purpose of this study was to investigate the effectiveness of the Facilitator-Collaborative-Reflective Model, a strategic plan for changing teachers' practices and beliefs, on a selected group of middle school teachers. This model of staff development training was based on Corey's (1953) Cooperative-Action-Research Model and Anders and Richardson (1994) Collaborative-Reflective Model. It supports the notion that earning a teachers' commitment to change by focusing on collaboration, reflection and the normative-re-educative process aids in altering teachers' beliefs and practices especially crucial to the change process. The year-long training provided for reflection, inquiry, and learning that was useful to teachers as they pursued their goals with their students. The lead teacher, as a change agent and transformational leader, assisted in this commitment to change by improving the teachers' self-concepts as they slowly changed. The collaborative and receptive environment of the staff development fostered acceptance and stimulation of ideas.^ Given the collaborative nature of the change process, qualitative research methods were used in the investigation. The research process was based on Stufflebeam's Context, Input, Process and Product (CIPP) Evaluation Model (Madaus, Scriven & Stufflebeam, 1983). This allowed for all three factors of the staff development model to be evaluated. The case studies and focus group were effective in discerning any actual change in practices or beliefs.^ The findings of the qualitative evaluation, consisting of a baseline survey, case studies, questionnaire and modified focus group interviews, concluded that all of the teachers were strongly influenced by the intervention model which was the subject of this study. From this evaluation, three distinct indicators were looked at to determine if any change in the teachers' practices and beliefs emerged: (1) change in practice and belief, (2) reflective feedback and (3) collaborative reflection. These indicators were common throughout the teacher responses thus substantiating the infusion of the Facilitator-Collaborative-Reflective Model at the school level for effective staff development. ^
Resumo:
The underrepresentation of women in physics has been well documented and a source of concern for both policy makers and educators. My dissertation focuses on understanding the role self-efficacy plays in retaining students, particularly women, in introductory physics. I use an explanatory mixed methods approach to first investigate quantitatively the influence of self-efficacy in predicting success and then to qualitatively explore the development of self-efficacy. In the initial quantitative studies, I explore the utility of self-efficacy in predicting the success of introductory physics students, both women and men. Results indicate that self-efficacy is a significant predictor of success for all students. I then disaggregate the data to examine how self-efficacy develops differently for women and men in the introductory physics course. Results show women rely on different sources of self-efficacy than do men, and that a particular instructional environment, Modeling Instruction, has a positive impact on these sources of self-efficacy. In the qualitative phase of the project, this dissertation focuses on the development of self-efficacy. Using the qualitative tool of microanalysis, I introduce a methodology for understanding how self-efficacy develops moment-by-moment using the lens of self-efficacy opportunities. I then use the characterizations of self-efficacy opportunities to focus on a particular course environment and to identify and describe a mechanism by which Modeling Instruction impacts student self-efficacy. Results indicate that the emphasizing the development and deployment of models affords opportunities to impact self-efficacy. The findings of this dissertation indicate that introducing key elements into the classroom, such as cooperative group work, model development and deployment, and interaction with the instructor, create a mechanism by which instructors can impact the self-efficacy of their students. Results from this study indicate that creating a model to impact the retention rates of women in physics should include attending to self-efficacy and designing activities in the classroom that create self-efficacy opportunities.
Resumo:
This research focuses on developing active suspension optimal controllers for two linear and non-linear half-car models. A detailed comparison between quarter-car and half-car active suspension approaches is provided for improving two important scenarios in vehicle dynamics, i.e. ride quality and road holding. Having used a half-car vehicle model, heave and pitch motion are analyzed for those scenarios, with cargo mass as a variable. The governing equations of the system are analysed in a multi-energy domain package, i.e., 20-Sim. System equations are presented in the bond-graph language to facilitate calculation of energy usage. The results present optimum set of gains for both ride quality and road holding scenarios are the gains which has derived when maximum allowable cargo mass is considered for the vehicle. The energy implications of substituting passive suspension units with active ones are studied by considering not only the energy used by the actuator, but also the reduction in energy lost through the passive damper. Energy analysis showed less energy was dissipated in shock absorbers when either quarter-car or half-car controllers were used instead of passive suspension. It was seen that more energy could be saved by using half-car active controllers than the quarter-car ones. Results also proved that using active suspension units, whether quarter-car or half-car based, under those realistic limitations is energy-efficient and suggested.
Resumo:
The oceanic carbon cycle mainly comprises the production and dissolution/ preservation of carbonate particles in the water column or within the sediment. Carbon dioxide is one of the major controlling factors for the production and dissolution of carbonate. There is a steady exchange between the ocean and atmosphere in order to achieve an equilibrium of CO2; an anthropogenic rise of CO2 in the atmosphere would therefore also increase the amount of CO2 in the ocean. The increased amount of CO2 in the ocean, due to increasing CO2-emissions into the atmosphere since the industrial revolution, has been interpreted as "ocean acidification" (Caldeira and Wickett, 2003). Its alarming effects, such as dissolution and reduced CaCO3 formation, on reefs and other carbonate shell producing organisms form the topic of current discussions (Kolbert, 2006). Decreasing temperatures and increasing pressure and CO2 enhance the dissolution of carbonate particles at the sediment-water interface in the deep sea. Moreover, dissolution processes are dependent of the saturation state of the surrounding water with respect to calcite or aragonite. Significantly increased dissolution has been observed below the aragonite or calcite chemical lysocline; below the aragonite compensation depth (ACD), or calcite compensation depth (CCD), all aragonite or calcite particles, respectively, are dissolved. Aragonite, which is more prone to dissolution than calcite, features a shallower lysocline and compensation depth than calcite. In the 1980's it was suggested that significant dissolution also occurs in the water column or at the sediment-water interface above the lysocline. Unknown quantities of carbonate produced at the sea surface, would be dissolved due to this process. This would affect the calculation of the carbonate production and the entire carbonate budget of the world's ocean. Following this assumption, a number of studies have been carried out to monitor supralysoclinal dissolution at various locations: at Ceara Rise in the western equatorial Atlantic (Martin and Sayles, 1996), in the Arabian Sea (Milliman et al., 1999), in the equatorial Indian Ocean (Peterson and Prell, 1985; Schulte and Bard, 2003), and in the equatorial Pacific (Kimoto et al., 2003). Despite the evidence for supralysoclinal dissolution in some areas of the world's ocean, the question still exists whether dissolution occurs above the lysocline in the entire ocean. The first part of this thesis seeks answers to this question, based on the global budget model of Milliman et al. (1999). As study area the Bahamas and Florida Straits are most suitable because of the high production of carbonate, and because there the depth of the lysocline is the deepest worldwide. To monitor the occurrence of supralysoclinal dissolution, the preservation of aragonitic pteropod shells was determined, using the Limacina inflata Dissolution Index (LDX; Gerhardt and Henrich, 2001). Analyses of the grain-size distribution, the mineralogy, and the foraminifera assemblage revealed further aspects concerning the preservation state of the sediment. All samples located at the Bahamian platform are well preserved. In contrast, the samples from the Florida Straits show dissolution in 800 to 1000 m and below 1500 m water depth. Degradation of organic material and the subsequent release of CO2 probably causes supralysoclinal dissolution. A northward extension of the corrosive Antarctic Intermediate Water (AAIW) flows through the Caribbean Sea into the Gulf of Mexico and might enhance dissolution processes at around 1000 m water depth. The second part of this study deals with the preservation of Pliocene to Holocene carbonate sediments from both the windward and leeward basins adjacent to Great Bahama Bank (Ocean Drilling Program Sites 632, 633, and 1006). Detailed census counts of the sand fraction (250-500 µm) show the general composition of the coarse grained sediment. Further methods used to examine the preservation state of carbonates include the amount of organic carbon and various dissolution indices, such as the LDX and the Fragmentation Index. Carbonate concretions (nodules) have been observed in the sand fraction. They are similar to the concretions or aggregates previously mentioned by Mullins et al. (1980a) and Droxler et al. (1988a), respectively. Nonetheless, a detailed study of such grains has not been made to date, although they form an important part of periplatform sediments. Stable isotopemeasurements of the nodules' matrix confirm previous suggestions that the nodules have formed in situ as a result of early diagenetic processes (Mullins et al., 1980a). The two cores, which are located in Exuma Sound (Sites 632 and 633), at the eastern margin of Great Bahama Bank (GBB), show an increasing amount of nodules with increasing core depth. In Pliocene sediments, the amount of nodules might rise up to 100%. In contrast, nodules only occur within glacial stages in the deeper part of the studied core interval (between 30 and 70 mbsf) at Site 1006 on the western margin of GBB. Above this level the sediment is constantly being flushed by bottom water, that might also contain corrosive AAIW, which would hinder cementation. Fine carbonate particles (<63 µm) form the matrix of the nodules and do therefore not contribute to the fine fraction. At the same time, the amount of the coarse fraction (>63 µm) increases due to the nodule formation. The formation of nodules might therefore significantly alter the grain-size distribution of the sediment. A direct comparison of the amount of nodules with the grain-size distribution shows that core intervals with high amounts of nodules are indeed coarser than the intervals with low amounts of nodules. On the other hand, an initially coarser sediment might facilitate the formation of nodules, as a high porosity and permeability enhances early diagenetic processes (Westphal et al., 1999). This suggestion was also confirmed: the glacial intervals at Site 1006 are interpreted to have already been rather coarse prior to the formation of nodules. This assumption is based on the grain-size distribution in the upper part of the core, which is not yet affected by diagenesis, but also shows coarser sediment during the glacial stages. As expected, the coarser, glacial deposits in the lower part of the core show the highest amounts of nodules. The same effect was observed at Site 632, where turbidites cause distinct coarse layers and reveal higher amounts of nodules than non-turbiditic sequences. Site 633 shows a different pattern: both the amount of nodules and the coarseness of the sediment steadily increase with increasing core depth. Based on these sedimentological findings, the following model has been developed: a grain-size pattern characterised by prominent coarse peaks (as observed at Sites 632 and 1006) is barely altered. The greatest coarsening effect due to the nodule formation will occur in those layers, which have initially been coarser than the adjacent sediment intervals. In this case, the overall trend of the grain-size pattern before and after formation of the nodules is similar to each other. Although the sediment is altered due to diagenetic processes, grain size could be used as a proxy for e.g. changes in the bottom-water current. The other case described in the model is based on a consistent initial grain-size distribution, as observed at Site 633. In this case, the nodule reflects the increasing diagenetic alteration with increasing core depth rather than the initial grain-size pattern. In the latter scenario, the overall grain-size trend is significantly changed which makes grain size unreliable as a proxy for any palaeoenvironmental changes. The results of this study contribute to the understanding of general sedimentation processes in the periplatform realm: the preservation state of surface samples shows the influence of supralysoclinal dissolution due to the degradation of organic matter and due to the presence of corrosive water masses; the composition of the sand fraction shows the alteration of the carbonate sediment due to early diagenetic processes. However, open questions are how and when the alteration processes occur and how geochemical parameters, such as the rise in alkalinity or the amount of strontium, are linked to them. These geochemical parameters might reveal more information about the depth in the sediment column, where dissolution and cementation processes occur.
Resumo:
The objective of this paper is to design a path following control system for a car-like mobile robot using classical linear control techniques, so that it adapts on-line to varying conditions during the trajectory following task. The main advantages of the proposed control structure is that well known linear control theory can be applied in calculating the PID controllers to full control requirements, while at the same time it is exible to be applied in non-linear changing conditions of the path following task. For this purpose the Frenet frame kinematic model of the robot is linearised at a varying working point that is calculated as a function of the actual velocity, the path curvature and kinematic parameters of the robot, yielding a transfer function that varies during the trajectory. The proposed controller is formed by a combination of an adaptive PID and a feed-forward controller, which varies accordingly with the working conditions and compensates the non-linearity of the system. The good features and exibility of the proposed control structure have been demonstrated through realistic simulations that include both kinematics and dynamics of the car-like robot.
Resumo:
In this paper, we develop a simple four parameter population balance model of in vivo neutrophil formation following bone marrow rescue therapy. The model is used to predict the number and type of neutrophil progenitors required to abrogate the period of severe neutropenia that normally follows a bone marrow transplant. The estimated total number of 5 billion neutrophil progenitors is consistent with the value extrapolated from a human trial. The model provides a basis for designing ex vivo expansion protocols.
Resumo:
Certification of an ISO 14001 Environmental Management System (EMS) is currently an important requirement for those enterprises wishing to sell their products in the context of a global market. The system`s structure is based on environmental impact evaluation (EIE). However, if an erroneous or inadequate methodology is applied, the entire process may be jeopardized. Many methodologies have been developed for making of EIEs, some of them are fairly complex and unsuitable for EMS implementation in an organizational context, principally when small and medium size enterprises (SMEs) are involved. The proposed methodology for EIE is part of a model for implementing EMS. The methodological approach used was a qualitative exploratory research method based upon sources of evidence such as document analyses, semi-structured interviews and participant observations. By adopting a cooperative implementation model based on the theory of system engineering, difficulties relating to implementation of the sub-system were overcome thus encouraging SMEs to implement EMS. (C) 2007 Elsevier Ltd. All rights reserved.
Resumo:
Subcutaneous heat-coagulated egg white implants (EWI) induce chronic, intense local eosinophilia in mice, followed by asthma-like responses to airway ovalbumin challenge. Our goal was to define the mechanisms of selective eosinophil accumulation in the EWI model. EWI carriers were challenged i.p. with ovalbumin and the contributions of cellular immunity and inflammatory mediators to the resulting leukocyte accumulation were defined through cell transfer and pharmacological inhibition protocols. Eosinophil recruitment required Major Histocompatibility Complex Class It expression, and was abolished by the leukotriene B4 (LTB4) receptor antagonist CP 105.696, the 5-lipoxygenase inhibitor BWA4C and the 5-lipoxygenase activating protein inhibitor MK886. Eosinophil recruitment in EWI carriers followed transfer of: a) CD4(+) (but not CD4(-)) cells, harvested from EWI donors and restimulated ex vivo; b) their cell-free supernatants, containing LTB4. Restimulation in the presence of MK886 was ineffective. CC chemokine receptor ligand (CCL)5 and CCL2 were induced by ovalbumin challenge in vivo. mRNA for CCL17 and CCL11 was induced in ovalbumin-restimulated CD4(+) cells ex vivo. MK886 blocked induction of CCL17 Pretreatment of EWI carriers with MK886 eliminated the effectiveness of exogenously administered CCL11, CCL2 and CCL5. In conclusion, chemokine-producing, ovalburnin-restimulated CD4(+) cells initiate eosinophil recruitment which is strictly dependent on LTB4 production. (C) 2008 Elsevier Inc. All rights reserved.
Resumo:
Este artigo é uma introdução à teoria do paradigma desconstrutivo de aprendizagem cooperativa. Centenas de estudos provam com evidências o facto de que as estruturas e os processos de aprendizagem cooperativa aumentam o desempenho académico, reforçam as competências de aprendizagem ao longo da vida e desenvolvem competências sociais, pessoais de cada aluno de uma forma mais eficaz e usta, comparativamente às estruturas tradicionais de aprendizagem nas escolas. Enfrentando os desafios dos nossos sistemas educativos, seria interessante elaborar o quadro teórico do discurso da aprendizagem cooperativa, dos últimos 40 anos, a partir de um aspeto prático dentro do contexto teórico e metodológico. Nas últimas décadas, o discurso cooperativo elaborou os elementos práticos e teóricos de estruturas e processos de aprendizagem cooperativa. Gostaríamos de fazer um resumo desses elementos com o objetivo de compreender que tipo de mudanças estruturais podem fazer diferenças reais na prática de ensino e aprendizagem. Os princípios básicos de estruturas cooperativas, os papéis de cooperação e as atitudes cooperativas são os principais elementos que podemos brevemente descrever aqui, de modo a criar um quadro para a compreensão teórica e prática de como podemos sugerir os elementos de aprendizagem cooperativa na nossa prática em sala de aula. Na minha perspetiva, esta complexa teoria da aprendizagem cooperativa pode ser entendida como um paradigma desconstrutivo que fornece algumas respostas pragmáticas para as questões da nossa prática educativa quotidiana, a partir do nível da sala de aula para o nível de sistema educativo, com foco na destruição de estruturas hierárquicas e antidemocráticas de aprendizagem e, criando, ao mesmo tempo, as estruturas cooperativas.
Resumo:
Tese de Doutoramento - Leaders for Technical Industries (LTI) - MIT Portugal
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.