- Vehicular Ad Hoc Networks (VANETs)
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Energy Efficient Wireless Sensor Networks
- Medical Image Segmentation Techniques
- Digital Image Processing Techniques
- Smart Grid Security and Resilience
- Advanced Software Engineering Methodologies
- Software System Performance and Reliability
- Safety Systems Engineering in Autonomy
- ECG Monitoring and Analysis
- Context-Aware Activity Recognition Systems
- IoT-based Smart Home Systems
- Interconnection Networks and Systems
- Advanced Image and Video Retrieval Techniques
- Aerodynamics and Fluid Dynamics Research
- Neural Networks and Applications
- Tactile and Sensory Interactions
- Computer Graphics and Visualization Techniques
- Genetics and Neurodevelopmental Disorders
- Robotic Path Planning Algorithms
- Network Security and Intrusion Detection
- Graph Theory and Algorithms
- Vehicle Dynamics and Control Systems
- Internet of Things and Social Network Interactions
Université Clermont Auvergne
2006-2025
China International Science and Technology Cooperation
2025
Chongqing Medical University
2025
Children's Hospital of Chongqing Medical University
2025
Peking University Shenzhen Hospital
2018-2023
Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes
2009-2020
Centre National de la Recherche Scientifique
2006-2019
Yanshan University
2015-2018
Sun Yat-sen University
2018
Shandong University
2018
Wireless Sensor Network (WSN) is one of the key technologies 21st century, while it a very active and challenging research area. It seems that in next coming year, thanks to 6LoWPAN, these wireless micro-sensors will be embedded everywhere, because 6LoWPAN enables P2P connection between nodes over IPv6. Nowadays different implementations stacks are available so interesting evaluate their performance term memory footprint compliant with RFC4919 RFC4944. In this paper, we present survey on...
<title>Abstract</title> Frame selection is a fundamental issue in video action recognition. It aims to minimize temporal redundancy and reduce computational cost. Current frame sampling strategies either rely on uniform based motion, lacking emphasis discriminative frames, or employ complex learning models additional modal information, compromising generalizability. To address these challenges, this paper presents an adaptive strategy. filters redundant frames through motion information...
Large Language Models (LLMs) are discovered to suffer from accurately retrieving key information. To address this, we propose Mask-Enhanced Autoregressive Prediction (MEAP), a simple yet effective training paradigm that seamlessly integrates Masked Modeling (MLM) into Next-Token (NTP) enhance the latter's in-context retrieval capabilities. Specifically, MEAP first randomly masks small fraction of input tokens and then directly performs standard next-token prediction autoregressive using...
Background Pediatric cardiomyopathies are rare but life-threatening conditions with high mortality. Limited data exists on their clinical features and risk factors, especially in Asian populations, highlighting the need for further research this area. Methods This retrospective cohort study analyzed from 212 pediatric patients diagnosed hypertrophic cardiomyopathy (HCM), restrictive (RCM), or phenotype (RP-HCM) at a single center China October 2012 to 2023, follow-up until 31, 2024....
This paper focuses on the routing protocol for driving safety that vehicle collects state message from roadside sensors in VANET-WSN. Routing Protocol Low Power and Lossy Networks (RPL), a tree-based protocol, adapts naturally to our requirement. But RPL is designed static wireless sensor network, so we need modify fit with high dynamic topology of For first time, utilize Geographical Information (GI) as metric (GI-RPL), which lets timely fashion. We also propose some strategies tuning To...
Vehicular Ad hoc Networks (VANETs) aim to improve transportation activities that include traffic safety, transport efficiency and even infotainment on the wheels, in which a great number of event-driven messages are needed disseminate region interest timely. However, due nature VANETs, highly dynamic mobility frequent disconnection, data dissemination faces challenges. Inter-Vehicle Communication (IVC) protocols key technology mitigate this issue. Therefore, we propose an infrastructure-less...
With the development of communication networks and widespread use mobile terminals, videos are increasingly shared distributed among users. During process, video is recompressed to a certain file size on sending side sent receiving via server. This makes robust watermark with low complexity resist recompression attacks become an important issue address. The proposed watermarking method in this article specially designed for resisting when quantization parameter (QP) greatly increased. In...
Precision agriculture has been considered as a new technique to improve agricultural production and support sustainable development by preserving planet resource minimizing pollution. By monitoring different parameters of interest in cultivated field, wireless sensor network (WSN) enables real-time decision making with regard issues such management water resources for irrigation, choosing the optimum point harvesting, estimating fertilizer requirements predicting crop yield more accurately....
The last few years have seen substantial progress in the field of smart objects (SOs): their number, diversity, performance and pervasiveness all been quickly increasing this evolution is expected to continue. To best our knowledge, little work has made leverage abundance resources develop assistive devices for Visually Impaired People (VIP). However, we believe that SOs can both enhance traditional functions (i.e. obstacle detection, navigation) offer new ways interacting with environment....
This paper studies the detection and isolation problem against False Data Injection Attack (FDIA) for distributed smart grids, by using designed Unknown Input Observer (UIO). Firstly, a simple but classical mathematics model of grid is introduced. Considering covert FDIA, detecting isolating cyber attack in grids. Then, considering disturbance uncertainty system model, adaptive thresholds are computed attack. Furthermore, UIO-based Algorithm proposed, computing observed residuals. Finally,...
Abstract:
The Wireless Sensor Networks (WSN), with their constant evolution, need more and practical effective WSN Management Tools (WMT) for large-scale deployment. Due to the resource constraints of wireless sensor node, it is impossible implement full classical SNMP standard in applications. Therefore, important develop new WMT providing a subset functionalities dedicated by taking into account node. In this paper, we propose named LiveNCM: LiveNode Non-invasive Context-aware, modular Management....
This paper describes a cooperative MANET protocol dedicated to intelligent transport systems, named CIVIC (Communication Inter Vehicule Intelligente et Cooperative). The is an auto-configuration inter-vehicle communication protocol, which supports adhoc and infrastructure networks, contains reactive proactive routing components, adapts different wireless standards. It context-aware reacting vehicle status, road traffic, geographic environment. location-based communication. To improve the...
Ocean is a strategic development base of biology, energy, water and metal. It has great potential for development. Underwater vehicle necessary equipment explore the underwater resources. So this project intends to develop equipment. In paper, virtual prototype established based on ADAMS introduced then analyze mechanical model. At last, experiment done in shallow sea. The shows that self-development remotely operated can satisfy with usage requirements.
Though Cyber Physical Systems (CPS) become very popular in last the decade, dependability of CPS is still a critical issue and related survey rare. We try to spell out jigsaw technologies figure technical trends dependable self-managing CPS. This first recalls motivation similar concepts. By analyzing four generic architectures, we summarize common characteristics assurance technologies, propose more environment-in-loop processing flow formal interaction between physical space cyber space....
BACKGROUND: Flexible reinforced laryngeal mask airway (FLMA®) has gained popularity in thyroid surgery, but air leak and displacement are still concerns. METHODS: In this randomized, single-blinded, noninferiority, controlled trial, we randomized patients scheduled for elective radical thyroidectomy to an endotracheal tube (ETT) group or a FLMA group. The primary outcomes were ventilation volume, peak pressure, partial pressure of end-tidal carbon dioxide (Pet co 2 ). Data collected after...
This paper presents a novel framework based on system observability to solve the structural vulnerability of cyber-physical systems (CPSs) under attack with application power grids. The adding measurement point method is applied detect angle and voltage bus by detection points between two lines in grid. Then generator dynamic equations are built analyze rotor angles angular velocities generators, simplified Power Management Units (PMUs) observe status generators. According impact series...
The wireless sensor networks (WSN) with their constant evolution, need new management methods to be monitored efficiently by taking into account constraints such as energy consumption, reliability and remote monitoring. Note that WSN has diverse application domains: smart home, care, environmental data collection etc. In order manage a large scale WSN, some network tools (WMTs) are developed. Some of them use SNMP protocol but it is impossible implement the full classical standard on each...