Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Hocine Sissaoui"'
Publikováno v:
In Control Engineering Practice 2010 18(9):1060-1068
Publikováno v:
Journal of Scientific Computing. 85
The purpose of this paper is the determination of the numerical solution of a classical unilateral stationary elliptic obstacle problem. The numerical technique combines Moreau-Yoshida penalty and spectral finite element approximations. The penalized
Publikováno v:
Afrika Matematika
Afrika Matematika, Springer, 2016, 28, pp.417-441. ⟨10.1007/s13370-016-0454-8⟩
Afrika Matematika, Springer, 2016, 28, pp.417-441. ⟨10.1007/s13370-016-0454-8⟩
International audience; The present study deals with the numerical simulation of steel solidification in continuous casting. We consider a semi-discretization with respect to the time of the studied evolution problem; then we have to solve a sequence
Publikováno v:
Nonlinear Dynamics. 82:1475-1482
The traffic of digital images has been quickly increased in the network. Security of image processing became important for many sectors, namely for medical applications. Currently, the transmission of medical images is a daily routine. The large volu
Publikováno v:
Solar Energy. 116:56-68
We consider three experimental small solar ponds (1 m × 1 m × 1 m) each pond contains one of the following salts, namely NaCl, Na 2 CO 3 and CaCl 2 respectively. The thermal behavior of these three ponds is being investigated numerically and experi
Autor:
Abdelkader Moumen, Hocine Sissaoui
Publikováno v:
Nonlinear Engineering, Vol 6, Iss 1, Pp 53-59 (2017)
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image
Publikováno v:
Synthèse : Revue des Sciences et de la Technologie. :77-87
The solar pond is composed of three different zones with different salinities. It is a simultaneously a collector and a solar energy storage device, unlike other sys tems that capture but do not store. The purpose of this work is to study the influen