Search
Energy dispersive X-Ray DIFfraction for COunterfeit Medicine detection – DIFCOM
The DIFCOM project aims at proposing a new technological solution to fight against counterfeit pharmaceuticals. Medicine counterfeiting is a current problem that the whole pharmaceutical field has to deal with. Globalization of exchanges combined with development of business via internet has led to
Forensic voice comparison – VoxCrim
The main objective of voxCrim is to determine objectively the conditions needed to use forensic voice comparison safely. The second objective is to inform the practitioners and the academic researchers about forensic voice comparison specificities. voxCrim wishes to follow open sciene principle a
Effect of a shock wave on a structure with contact using mesh refinement and parallelism – PRECIS
The goal of this project is the development and mathematical analysis of a numerical tool for the simulation of the interaction of air shock waves with deformable structures, possibly involving the fragmentation and contact of the solid elements. The solid is simulated using a Discrete Element met
e-flooding: multi-view management of fast floods – i-Nondations
Every year floods happen. Solutions exist for slow floods but fast ones are difficult to predict and to handle. This project aims to model fast floods in term of risk management and impact on the infrastructures using data collected by technological or human sensors. The project will integrate dif
Nanostructured plastic scintillators for enhanced radiation detection – DECISIoN
This 42 month project aims at developing breakthrough radiation detectors to address NR risk issues. It takes advantage of recent progresses in nanostructuration and nanophotonics to control light emission of radioluminescent materials commonly used in such devices. This will pave the way for more e
Code-based Cryptography – CBCRYPT
In recent years, there has been a substantial amount of research on quantum computers. Such computers would be a major threat for all the public key cryptosystems used in practice, since all these systems rely on the hardness of integer factoring or discrete logarithms, and these problems are eas
Optimizing queries to video surveillance data under privacy constraints for a distributed architecture – BioQOP
The BioQOP project deals with an architecture where a facial recognition system is distributed on several nodes. The innovation is to train each of these nodes in such a way that: (1) Individually, each node has a weak distinguishability capability; (2) Taken as a whole, the performance of the sys
Protocol Analysis - Combining Existing Tools – TECAP
The rise of the Internet and the ubiquity of electronic devices have changed our daily life. Nowadays, almost all the services have a digital counterpart (e.g. electronic voting, messaging, electronic commerce). Unfortunately, this digitalization of the world comes with tremendous risks for our secu
Audit tools for cryptographic primitives – CryptAudit
Symmetric cryptosystems are widely used because they are the only ones that can achieve some major functionalities such as high-speed or low-cost encryption, fast message authentication, and efficient hashing. But, unlike public-key cryptographic algorithms, secret-key primitives do not have satisfy
Computer Vision for Automated Holistic Analysis of Humans – ENVISION
This proposal is motivated by the rapid evolution in the volume, complexity and utility of biometrics. While in the past, biometrics was mainly used for person identification by employing simple matching of well-defined single biometric traits (such as face, iris or fingerprint), we are now – rather
Management of citizens and volunteers: the social media contribution in crisis situation – MACIV
Recent events in France (e.g. 2016 flooding in Loiret, 2015 and 2016 terrorist attacks in Paris and Nice) have confirmed the opportunities and challenges raised by social media in crisis management, for instance: The Facebook safety check, the hashtag #parisportesouvertes, the difficulties when co
Broad spectrum antidotes against chemical warfare agents – CNS-Antidote
Since the beginning of the 21st century, the number of terrorist attacks and subsequent fatalities has dramatically increased worldwide, respectively 30 and 10 times more. Organophosphorus (OP) used as chemical warfare agents present a persistent threat to the civilians as a consequence of armed con
Terrorism, Radicalization and Government Policy in MENA (TMENA2) – TMENA2
This proposal makes a strong case for the research into the dynamics and drivers of radicalism and highlights the relevance of this research to European countries. It also shows awareness of wide range of sophisticated methodologies and datasets and the intention to use these techniques in the analy
Understanding and Simulation of Human Behaviors in areas affected by disasters : from analysis to anticipation – Com2SiCa
While the past forty years have witnessed a significant increase in the number of disasters, they also have shown the intricacy of the events where many causal relations intermingle (physical, biological, technological and human related causes). Those trends should not reverse over the coming years,
Quantum Banknotes and Information-Theoretic Credit Cards – quBIC
For a quantum-safe future, classical security systems as well as quantum protocols that guarantee security against all adversaries must be deployed. Here, we will study and implement one of the most promising quantum applications, namely unforgeable quantum money. A money scheme enables a secure tra
Responding to the spreading of conspiracy theories – CONSPIRACY
Belief in conspiracy theories is on the rise and has been associated with a variety of worrisome attitudes and behaviors, from a diffuse distrust toward institutions to the justification of antisocial behavior and, in some extreme cases, to active involvement in terrorist organizations. Many countri
On political vulnerability in the nuclear age – VULPAN
Nuclear weapons choices commit populations and societies for decades, can wipe them out in matters of minutes, but are subject to little democratic discussion. Similarly, concerns are raised about the complacency of the post-Cold War generation regarding the nuclear danger but those attitudes are un