- Energy Efficient Wireless Sensor Networks
- graph theory and CDMA systems
- VLSI and Analog Circuit Testing
- Advanced Graph Theory Research
- Integrated Circuits and Semiconductor Failure Analysis
- Fault Detection and Control Systems
- IoT and Edge/Fog Computing
- Computational Geometry and Mesh Generation
- Security in Wireless Sensor Networks
- VLSI and FPGA Design Techniques
- Mathematics and Applications
- Mobile Ad Hoc Networks
- Graph Labeling and Dimension Problems
- Vehicle Routing Optimization Methods
- Matrix Theory and Algorithms
- Energy Harvesting in Wireless Networks
- Anomaly Detection Techniques and Applications
- Optimization and Packing Problems
- Complexity and Algorithms in Graphs
- Distributed systems and fault tolerance
- Graph theory and applications
- Opportunistic and Delay-Tolerant Networks
- Chaos-based Image/Signal Encryption
- Advanced Combinatorial Mathematics
- Interconnection Networks and Systems
Laboratoire des Sciences et Techniques de l’Information de la Communication et de la Connaissance
2014-2024
Université de Bretagne Occidentale
2014-2024
Centre National de la Recherche Scientifique
2012-2021
Federal University of Agriculture
2021
Manchester Metropolitan University
2021
Centre Hospitalo-Universitaire Bab El Oued
2017
Université Européenne de Bretagne
2012-2016
Département d'Informatique
2000
University of Cologne
1980-1984
University of Bonn
1978
The number of connected devices is growing and in the near future it expected to become extremely large cities. As a consequence, using simulators study prepare project installing new networks before their real deployment great importance. They can help predict some important information like signal overload or feasibility terms location, interferences, communication cost. In this paper we present architecture for platform CupCarbon, developed within research PERSEPTEUR. main objective...
Several trusted tasks use consensus algorithms to solve agreement challenges. Usually, agreements are used ensure data integrity and reliability in untrusted environments. In many distributed networking fields, the Proof of Work (PoW) algorithm is commonly used. However, standard PoW mechanism has two main limitations, where first high power consumption second 51% attack vulnerability. this paper, we look improve protocol by introducing several proof rounds. Any given node should resolve...
Abstract Nowadays, cloud computing offers a digital infrastructure for smart city development. Cognitive cities are steadily automating daily urban processes. The ever expanding objective‐driven communities gather and share sensitive data that must be stored securely. Cloud suitable platform allows cognitive to access re‐access learn from their past adapt its current behaviour. However, the is an untrusted entity may expose when decrypted processing by systems. In this paper, we treat issue...
In the new generation of networks, not only computers are connected but also objects like cars, streets, buildings, or just, everything. general, these things communicate by means internet using gateways. Simulating systems can help to validate specific algorithms and concepts. However, it cannot give any accurate information about reality when some problems arise such as delays, disconbectivity, attacks, insecurity, especially in case large networks. Also, real implementation networks is...
Critical systems, like Unmanned Aerial Systems (UAS) operate in uncertain environments and have to face unexpected obstacles, weather changes sensor, hardware or software failures. Therefore, a health management system is needed detect locate the failure real time. In this paper, we propose Field Programmable Gate Array (FPGA) implementation based on Bayesian network (BN) representation, that allows continuously monitor embedded under time resource constraints. The generated by specific...
Nowadays, forest fires are a serious threat to the environment and human life. The monitoring system for should be able make real-time of target region early detection fire threats. In this paper, we present new approach based on integration Data Mining techniques into sensor nodes. idea is use clustered WSN where each node will individually decide detecting using classifier techniques. When detected, corresponding send an alert through its cluster-head which pass gateways other...
Padberg (Padberg, M. W. 1973. On the facial structure of set packing polyhedra. Math. Programming 5 199–215.) has shown that if a graph G with vertex V constitutes clique (odd cycle, odd anticycle), then inequality Σ x∈V x v ≤ 1 (Σ ½(|V| − 1), 2) defines facet P(ℐ ST (G)), convex hull incidence vectors stable sets in G. We generalize concepts cliques, cycles and anticycles to arbitrary independence systems (E, ℐ) show corresponding inequalities define facets P(ℐ), independent sets.
The aim of this paper is to propose an embedded Decision Making module for autonomous Unmanned Aerial Vehicle (UAV, commonly known as drone) missions, based on Influence Diagrams. allows the choice adequate recovery action in case failure scenarios. We jointly show application approach a real drone mission. also hardware and software implementations adaptive, online real-time Making, which are demonstrated Hybrid CPU/FPGA Zynq platform.
A leader node in Ad hoc networks and especially WSNs IoT is needed many cases, for example to find a with minimum energy or situated on the extreme left of network. For this kind applications, algorithms must be robust fault-tolerant since it difficult even impossible intervene if fails. Such situation can catastrophic case that leader. In paper, we present new algorithm, which based tree routing protocol. It starts from local leaders will start process flooding determine spanning tree....
Event detection is an important part in many Wireless Sensor Network (WSN) applications such as forest fire, environmental pollution. In this kind of applications, the event must be detected early order to reduce threats, damages. paper, we propose a new approach for fire detection, which based on integration Data Mining techniques into sensor nodes. The idea partition node set clusters so that each can individually detect fires using classification techniques. Once detected, corresponding...
In the fast moving field of computer cryptography, researchers are actively working on addressing various emerging challenges to keep tomorrow's systems secure. Many efforts focused computation speed and massive data size requirements today's systems. Significant research targeting computational complexity by focusing number cryptographic operations or scope application. this paper, we present an asymmetric homomorphic encryption scheme that relies converting base numbers a given in such way...
The Leader Election in Wireless Sensor Networks depends on the nature of application domain, use case and energy consumption. In real time applications, choice will be based speed election, where is not important, classical algorithm allowing to elect such a node called Minimum Finding Algorithm. this algorithm, each sends its value broadcast mode better received. This process very consuming reliable since it subject an important number collisions lost messages. paper, we propose new BROGO...
Modern small-size UAVs depend on highly complex architectures with many sensors and computer-controlled actuators. The size, weight budget constraints leave little or no room for redundant systems. So all components must be reliable any fault detected as early possible. In this paper, we propose an adaptive, real-time, on-board system to continuously monitor sensors, software, hardware the detection diagnosis of failures by means Bayesian networks. particular, optimized implementation...
The endoplasmic reticulum (ER) is an intricate network that pervades the entire cortex of plant cells and its geometric shape undergoes drastic changes. This paper proposes a mathematical model to reconstruct dynamics by combining node movements within topological changes engendered these nodes. topology in determined modified optimization procedure from work (Lemarchand, et al. 2014) which minimizes total length taking into account both degree angle constraints, beyond conditions...