 |
A brief description is provided for various LIRMM research topics. Each description includes a link to the corresponding research team's own Web site.
 |
ARITHMETICS & COMPUTER SCIENCE
Arithmetic, the science of numbers, is closely linked with computer science. Examples include machine level arithmetic (computer arithmetic), algorithms and applications for cryptology and discrete geometry.
Our work explores these relationships by focusing on representations of numbers in various numeration systems.
Find out more: ARITH team home page
|
 |
BIOINFORMATICS
At the crossroads of biology and computer science, bioinformatics seeks to resolve biological issues through computing. Notably, bioinformatics is used to predict the localization of genes following genomic sequencing..
The digital nature of biological entities (such as DNA, RNA, genomes, protein, gene activity) is the foundation for computer modelling, whereas biotechnological methods provide such vast quantities of data that it would be unimaginable to consider processing without using computers. One of the most recent approaches in bioinformatics research is the desire to systematically understand the interactions between biological objects, such as controlling gene activity.
Find out more: MAB team (Methods and Algorithms for Bioinformatics) home page
|
 |
DATA MINING AND HEALTHCARE
With its experience in a wide range of application fields, the Tatoo* team has launched four collaborative projects focusing on the difficult problem of data mining in the healthcare field:
- ISPED in Bordeaux, analyzing the PAQUID cohort and study aging of people over 65 years old.
- INSERM U868 in Montpellier, analyzing genomic profiles for breast cancer.
- MMDM (University of Montpellier 2), studying the genes related to Alzheimers disease.
- Praxiling laboratory (University of Montpellier 3), analyzing testimonials by Alzheimer patients.
This work highlights the challenges that need to be addressed for data mining in this field.
* Tatoo: knowledge exTraction from large dAtabases: sequential paTterns and OntOlogies
Find out more: Tatoo team home page
|
 |
IMAGE & INTERACTION
The ICAR team carries out its research activity by focusing on three major scientific directions that associate images and interaction:
- Coding and protecting visual data
- Image analysis and processing
- 3-D modelling
These three areas cover a wide range of theoretical and applied development opportunities.
Fields of application include medical, cultural heritage (artistic and paleontological), security, agronomics, robotics and manufacturing and agri-food industries.
Find out more: ICAR team home page
|
 |
MEDICAL ROBOTICS: FROM MINI-INVASIVE SURGERY TO ENDOLUMINAL SURGERY
We are currently working to design new robots on an increasingly smaller scale (around 1 cm), and to control these robots so surgeons can perform surgical operations inside the intestine by introducing their tools via the patients mouth, from where they then descend through the oesophagus.
Until now, surgeons have been able to establish a diagnosis by observing ingested capsules that are equipped with a camera. In the future, they will be able to carry out more complex actions such as performing biopsies or sewing stitches. This type of surgery, which is designed to handle pathologies such as gastric reflux and morbid obesity, enables out-patient surgery without any visible scarring and it reduces post-surgery trauma significantly.
Find out more: Medical robotics platform
|
 |
DESIGN AND TEST OF MICROELECTRONIC SYSTEMS
Work is carried out to prevent attacks on hardware focuses on an analysis of potential vulnerability in terms of circuits and integrated systems, in order to offer robust methods for integrating cryptographic primitives into arithmetic, logical and technological systems.
Now that digital systems have effectively replaced paper as the main information media, a real interest in using cryptology when designing these systems can be felt strongly throughout the industry. Computer hardware has become the Achilles heel for security applications, and hardware attacks have become more common. In fact, these attacks are now recognized as being the most dangerous in the sense that they enable people to obtain algorithmic encryption keys, such as those used on common smartcards, at a relatively low cost and without requiring a high skill level.
En savoir plus : CCSI team(Design of integrated circuits and systems) home page
|
|
|  | |