- IPv6, Mobility, Handover, Networks, Security
- Infrastructure Resilience and Vulnerability Analysis
- Occupational Health and Safety Research
- Supply Chain Resilience and Risk Management
- Risk and Safety Analysis
- RNA and protein synthesis mechanisms
- Software Reliability and Analysis Research
- Distributed and Parallel Computing Systems
- Technology Assessment and Management
- Peer-to-Peer Network Technologies
- Pluripotent Stem Cells Research
- Advanced Authentication Protocols Security
- Access Control and Trust
- ICT Impact and Policies
- Satellite Communication Systems
- Complex Systems and Decision Making
- Advanced biosensing and bioanalysis techniques
- CRISPR and Genetic Engineering
- Regional resilience and development
- Genomics and Chromatin Dynamics
- Advanced Wireless Network Optimization
- Systems Engineering Methodologies and Applications
- RNA Research and Splicing
Guangdong Provincial People's Hospital
2024
Guangdong Academy of Medical Sciences
2024
Southern Medical University
2024
Institut National des Sciences Appliquées Rouen Normandie
2017-2021
Université de Rouen Normandie
2019-2021
Normandie Université
2021
Guangzhou Institutes of Biomedicine and Health
2021
Chinese Academy of Sciences
2021
Université Ibn-Tofail
2016-2019
École Nationale Supérieure de Statistique et d'Économie Appliquée
2019
Abstract Transcription and genome architecture are interdependent, but it is still unclear how nucleosomes in the chromatin fiber interact with nascent RNA, which relative nuclear distribution of these RNAs elongating RNA polymerase II (RNAP II). Using super-resolution (SR) microscopy, we visualized transcriptome, both nucleoplasm nucleolus, nanoscale resolution. We found that organize structures termed nanodomains, whose characteristics independent number transcripts produced over time....
In this paper, we contribute to the enhancement of routing in unstructured Peer-to-Peer (P2P) systems. Our contribution aims propose an alternative repetitive interactions between peers discovery which waste considerable time. We a methodology that seeks effectiveness and swiftness. Contrary classic heuristic-based strategies, main goal our proposition is every peer prepares database at integration phase. The includes information about peers, locations, routes destination, etc. Every...
Abstract During early development, gene expression is tightly regulated. However, how genome organization controls during the transition from naïve embryonic stem cells to epiblast still poorly understood. Using single-molecule microscopy approaches reach nanoscale resolution, we show that remodeling affects transcription pluripotency transition. Specifically, after exit state, chromatin becomes less compacted, and OCT4 factor has lower mobility more bound its cognate sites. In cells, active...
Objectives: The IP Multimedia Subsystem (IMS) is an architectural framework for delivering protocol-based services that enables easy deployment of new rich multimedia mixing voice and data. In fact, the IMS vulnerable to several malicious uses can be conducted by its users. We propose in this paper, a security enhancement model monitor system build rapid normal functioning retrieval after failing. Methods/Statistical Analysis: weakness network topology structure makes it target both cellular...
In this paper, we propose an indicator to systems-of-systems (SoS) structural analysis through dependencies evaluation which is based on interoperability and exchange inefficiency assessments, with representing links between component systems within the SoS. Interoperability a quality that can be viewed from various perspectives. Therefore, illustrative classification for embraces: barriers, scopes levels. Our study involves set of metrics assess each interdependency’s barriers SoS Two...
Long Term Evolution (LTE) is spreading and becoming the dominant cellular networking technology. This revolution of telecommunication network implementation methodology from its circuit-switched pattern towards a packet-switched that resembles ordinary packet-based networks, like Internet. Moreover, operators have adopted new mechanism, in order to handle voice calls over LTE network, called Voice (VoLTE), which changes how these are handled, both user equipment infrastructure perspectives....
Les échecs, les erreurs et bien d'autres irrégularités représentent menaces principales aux systèmes de systèmes.Nous présentons deux scénarios qui déclenchent ces menaces.Le premier scénario est lorsqu'une perturbation désorganise une partie du système voire le tout entier (dans certains cas) deuxième exploitation d'une vulnérabilité ait lieu.Dans cet article, on représente notre approche pour la gestion ciblant systèmes.On s'appuie sur l'exploitation tableau bord supervision des...