- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Cooperative Communication and Network Coding
- Network Security and Intrusion Detection
- Peer-to-Peer Network Technologies
- Security in Wireless Sensor Networks
- Advanced Vision and Imaging
- Advanced Image and Video Retrieval Techniques
- Robotics and Sensor-Based Localization
- Artificial Intelligence in Healthcare
- Computer Graphics and Visualization Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Mobile Agent-Based Network Management
- Grouting, Rheology, and Soil Mechanics
- Image Retrieval and Classification Techniques
- Digital Imaging for Blood Diseases
- Diabetic Foot Ulcer Assessment and Management
- Privacy-Preserving Technologies in Data
- Video Analysis and Summarization
- Energy Efficient Wireless Sensor Networks
- Concrete Properties and Behavior
- Data Mining Algorithms and Applications
- Telemedicine and Telehealth Implementation
- 3D Modeling in Geospatial Applications
- Mining Techniques and Economics
Université de Limoges
2006-2024
XLIM
2011-2023
Centre National de la Recherche Scientifique
2012-2023
Diabetes affects roughly 537 million people in the world, and it is predicted to reach 783 by 2045. Diabetic Foot Ulcer (DFU) a major issue with diabetes that may lead lower limb amputation. The rapid evolution of DFU demands immediate intervention prevent terrible consequences amputation related complications.This research introduces novel approach utilizing deep neural networks machine learning for accurate classification diabetic foot ulcer images. proposed method harnesses cutting-edge...
Abstract Emerging technological advances in wireless communication and networking have led to the design of large scale networks small sensor units with minimal power requirements multifunctional processing. Though energy harvesting technologies are improving, sensors remains a scarce resource when designing routing protocols between nodes base station. This paper proposes multi-hop graph-based approach for an energy-efficient (MH-GEER) protocol which aims distribute consumption clusters at...
The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible introduction various applications adhoc networks. Not only is infrastructure these networks inherently vulnerable but they increased requirements regarding their security as well. As intrusion prevention mechanisms, such encryption authentication, are not sufficient security, we need a second line defence, Intrusion Detection. focus this paper on distributed intelligent...
Diabetes affects roughly 537 million people, and is predicted to reach 783 by 2045. Foot Ulcer (DFU) a major complication associated with diabetes can lead lower limb amputation. The rapid evolution of diabetic foot ulcers (DFUs) necessitates immediate intervention prevent the severe consequences amputation related complications. Continuous meticulous patient monitoring for individuals crucial currently carried out medical practitioners on daily basis. This research article introduces...
Wireless sensor networks (WSNs) face some security issues when transmitting data to the base station as these involve resources scarcity that needs be tackled in routing protocols. More specifically, collected and distributed are only profitable if their confidentiality is guaranteed. Lately, approaches have used network coding properties comply with issues. This paper proposes a Secure Network Coding-enabled approach for confidential cluster-based Routing (SNCR) protocol wireless networks....
A wireless ad-hoc network is a which does not use any infrastructure such as access points or base station. Instead, the mobile nodes forward packets to each others, allowing communication among outside transmission range. In this dynamic network, node considered router but in an energy-conserving manner. This fact makes active element able of best and worst. Actually, malicious can easily disrupt proper functioning routing by simply refusing message (misbehavior node), inject wrong packets,...
Peer-To-Peer networks have become increasingly common as a means of transferring files over Internet. However, user anonymity and privacy are not typically protected in such peer-to-peer systems. An adversary can gain knowledge about only the content being transferred but also senders receivers files. In this paper, we describe design experimentation AnonymP2P new Anonymous confidential P2P system. works on principle social with nodes identified by virtual addresses where each node change...
It is a known fact that AI models need massive amounts of data for training. In the medical field, are not necessarily available at single site but distributed over several sites. field sharing, particularly among healthcare institutions, to maintain confidentiality sensitive information often restricts comprehensive utilization real-world in machine learning. To address this challenge, our study experiments with an innovative approach using federated learning enable collaborative model...
Peer-To-Peer networks are becoming increasingly common as a mean of transferring files over Internet. In this paper, we describe, first, the design and implementation our P2P system (MultiPathP2P). This latter is based on social concepts where nodes identified through their virtual addresses, have designed protocol 1) An architecture exploiting principle by addresses able to randomly change neighbors 2) A process data request file sharing differing from those supported in other networks....
Content-based image retrieval (CBIR) is a technique for images based on their visual features, i.e. induced by pixels. The are, classically, described the feature vectors. Those vectors reflect texture, color or combination of them. accuracy CBIR system highly influenced (i) definition vector describing image, (ii) indexing and (iii) process. In this paper, we propose new entitled ISE (Image Search Engine). Our defines optimum texture features as an vector, including Particle Swarm...
Wireless sensor networks (WSNs) are ad hoc composed mainly of tiny and resource-constrained nodes, rapidly growing as a technology for low-cost, large-scale automated systems to sense monitor different range potential environments. Network Coding (NC) technique has been proposed these various reasons such improving the throughput enhancing energy efficiency routing protocols. Meanwhile, remain prone many types attacks that damage safety reliability data routing. One type attack is Man In The...
Indexing video by the concept is one of most appropriate solutions for such problems. It based on an association between a and its corresponding visual sound, or textual features. This kind not trivial task. requires knowledge about context. In this paper, we investigate new detection approach to improve performance content-based multimedia documents retrieval systems. To achieve goal, are going tackle problem from different plans make four contributions at various stages indexing process....
Dynamic networks can be tremendously challenging when deploying distributed applications on autonomous machines. Further, implementing services like routing and security for such is generally difficult problematic. Consequently, multi-agent systems are well suited designing where several agents interact or work together to perform a set of tasks satisfy goals, hence moving the problem analyzing from global level local therefore reducing design complexity. In our previous paper, we presented...
Wireless sensor networks (WSNs) have been widely used for applications in numerous fields. One of the main challenges is limited energy resources when designing secure routing such networks. Hierarchical organization nodes network can make efficient use their resources. In this case, a subset nodes, cluster heads (CHs), entrusted with transmitting messages from to base station (BS). However, existence selfish or pollution attacker causes data transmission failure and damages availability...
Mobile Ad hoc NETworks (MANET) are a special kind of wireless net- works where there is neither centralized authority nor pre-existing infrastructure. Hence, in such situation, authenticating nodes becomes challenging task. This even more true that some may be tempted by spoofing other identity order to gain rights and privileges. In context, protocol based on keys exchange as Diffie-Hellman can used. However, vulnerable impersonation attack e.g. the Man Middle (MIM) attack. The main...