Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Zine El Abidine Guennoun"'
Publikováno v:
Mathematical Modelling and Analysis, Vol 24, Iss 3 (2019)
We show that integrals involving the log-tangent function, with respect to any square-integrable function on , can be evaluated by the harmonic series. Consequently, several formulas and algebraic properties of the Riemann zeta function at odd positi
Externí odkaz:
https://doaj.org/article/6ff99c35f212497380bb8f590cf1a43e
Publikováno v:
Statistics, Optimization & Information Computing; Sep2023, Vol. 11 Issue 4, p963-977, 15p
Autor:
Chokri Nouar, Zine El Abidine Guennoun
Publikováno v:
Applied Mathematics & Information Sciences. 14:977-984
Publikováno v:
Journal of Number Theory. 211:113-138
We study the distribution of values of the Riemann zeta function $\zeta(s)$ on vertical lines $\Re s + i \mathbb{R}$, by using the theory of Hilbert space. We show among other things, that, $\zeta(s)$ has a Fourier expansion in the half-plane $\Re s
Autor:
Mounib Khanafer, Hamid Hajaje, Junaid Israr, Mouhcine Guennoun, Zine El Abidine Guennoun, Youssef Gahi
Publikováno v:
CCECE
ElGamal system was introduced by Taher ElGamal in his landmark paper in 1985 [1]. ElGamal is an important asymmetric cryptosystem that is based on the discrete logarithm problem. In brief, this cryptosystem relies on the difficulty of computing discr
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 24:129-154
In this paper, a novel symmetric image encryption algorithm is proposed on the basis of the chaotic billiard (Sinai billiard). These chaotic systems, characterized by the highest degree of chaos, h...
Publikováno v:
International Journal of Smart Security Technologies. 6:1-32
Information privacy and protection is fundamental in the context of path computation. When a path computation client (PCC) requests the shortest path between two nodes from a path computation element (PCE), it desires to do so while protecting the se
Publikováno v:
International Journal of Advanced Computer Science and Applications. 12
Both IEEE 802.11 and IEEE 802.15.4 standards adopt the CSMA-CA algorithm to manage contending nodes’ access to the wireless medium. CSMA-CA utilizes the Binary Exponential Backoff (BEB) scheme to reduce the probability of packet collisions over the
Publikováno v:
CCECE
Current Path Computation Elements (PCE) are limited to scaling only hundreds to a few thousand nodes, depending on the underlying path computation algorithm. This is because the entire network is considered one domain when applying the path computati
Publikováno v:
International Journal of Engineering Research in Africa. 35:24-37
In this paper we present an approach to minimize the actuarial risk for the optimal choice of a form of reinsurance, and this is intended to be through a choice of treated parameters that minimize the risk using the Conditional Tail Expectation and t