{"title":"Renormalized solutions for nonlinear anisotropic parabolic equations","authors":"A. Salmani, Y. Akdim, M. Mekkour","doi":"10.1109/ISACS48493.2019.9068873","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068873","url":null,"abstract":"In this paper, we establish the existence of a renormalized solutions of anisotropic parabolic operators of the type <tex>$frac{partial b(x,u)}{partial t}-sumlimits_{i=1}^{N}partial_{i}a_{i}(x, t, u, nabla u)=f$</tex> and <tex>$b(x, u)(t = 0) = b(x, u_{0})$</tex>, where the right hand side <tex>$f$</tex>’ belongs to <tex>$L^{1}(Q_{T})$</tex> and <tex>$b(x, u_{0})$</tex> belongs to <tex>$L^{1}(Omega)$</tex>. The function <tex>$b(x, u)$</tex> is unbounded on u, the operator <tex>$-sum_{i=1}^{N}partial_{i}a_{i}(x, t, u, nabla u)$</tex> is a Leray-Lions operator.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical simulation of the SIR and Lotka-Volterra models used in biology","authors":"Inasse El Arabi, A. Chafi, S. Alami","doi":"10.1109/ISACS48493.2019.9068876","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068876","url":null,"abstract":"In this work, we will simulate different mathematical models used in biology, the first one is used to describe the dynamics of biological systems in which a predator and its prey interact with each other, called the lotka-volterra model, the second one is used to describe the evolution of an infectious disease in any population, and the last is used in the Monod model which describe bacterial growth in a given environment. First, we will present the three mathematical models that govern the evolution of the prey relative to the predator and vice versa, the spread of an infectious agent within a population, or even bacterial growth in a given environment. These models form a system of non-linear and coupled equations, which requires special numerical processing because of the biological terms used in these one. The numerical simulation is based on the explicit Runge-Kutter method of order 4 (ODE 45) which is best suited to solve this type of equation system.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114174017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fully homomorphic encryption scheme on a nonCommutative ring R","authors":"M. Elhassani, A. Boulbot, A. Chillali, A. Mouhib","doi":"10.1109/ISACS48493.2019.9068892","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068892","url":null,"abstract":"This article is an introduction to a well known problem on the ring $mathbb{F}_{q}[e]$ where $pmb{e}^{3}=pmb{e}^{2}$: Fully homomorphic encryption scheme. In this paper, we introduce a new diagram of encryption based on the conjugate problem on $mathrm{F}_{q}[pmb{e}],(mathbf{ESR}(mathbb{F}_{q}[pmb{e}]))$ · This diagram is generally impossible to decipher because it rests on a new problem very difficult to solve called problem of conjugate on a noncommutative reference; $mathbb{F}_{q}[pmb{e}]$. This encryption scheme is based on two difficult methodes; discrete logarithm problem and conjugal classical problem.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"539 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient meshless method for water flows through channels with bottom topography","authors":"E. Chaabelasri, Mohammed Jevar","doi":"10.1109/ISACS48493.2019.9068862","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068862","url":null,"abstract":"─ This paper aims to build an efficient radial basis function method to simulate the shallow water flow in an open channel with bottom topography. A special source term approximation, which represents an artificial viscosity, is introduced so that the proposed methods can preserve the still water steady state exactly and acquire Shock-capturing capabilities. Furthermore, the non-negativity of the water height is preserved and the method is well-balanced for the still water steady-state solutions. Promising numerical results are obtained at the end to verify these properties for problems involving transcritical flow.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Feature Learning and Engineering Based Approach for Face Shape Classification","authors":"Theiab Alzahrani, W. Al-Nuaimy, Baidaa Al-Bander","doi":"10.1109/ISACS48493.2019.9068910","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068910","url":null,"abstract":"Face shape classification is a vital process to choose an appropriate eyelashes, hairstyle and facial makeup, and selection of a suitable glasses' frames according to the guidelines from experts. Measuring face characteristics by beauty experts manually costs time and efforts. Therefore, developing automated face shape identification system could alleviate the need for additional time and efforts made by experts. Many automatic face shape classification methods have been proposed in the literature; however, the existing methods tackle many challenges due to the complexity of face geometry and variation in its characteristics. This paper presents a deep convolutional neural network method (CNN) approach for classifying face shape into five types. The proposed method which is based on merging the features learnt by CNN with hand crafted features represented by histogram of oriented gradients (HOG) and facial landmarks has proven to be efficient in identification of facial shape. The obtained results demonstrate that the proposed method is promising in identifying the shape of face achieving accuracy of 81.1%.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116015080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amal Hader, Chakir El Kasri, E. Tissir, F. E. Haoussi
{"title":"Delay dependent Stability analysis of Teleoperation Systems via input output approach","authors":"Amal Hader, Chakir El Kasri, E. Tissir, F. E. Haoussi","doi":"10.1109/ISACS48493.2019.9068883","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068883","url":null,"abstract":"In this paper the stability analysis problem of bilateral teleoperation systems with time varying delay is studied. By using the scaled small gain theorem (SSG) with three therms approximation of delayed state, and choosing adequate Lyapunov-Krasovskii (L-K) functional a new stability criterion is expressed in terms of linear matrix inequalities. The criterion can be easily examined using standard numerical simulation.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image processing and machine learning applications in mining industry: Mine 4.0","authors":"H. Ouanan, E. Abdelwahed","doi":"10.1109/ISACS48493.2019.9068884","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068884","url":null,"abstract":"Recently, Image processing (IP) and Machine learning (ML) algorithms have been successfully used in a wide variety of industry sectors. In this paper, we first provide mining engineers with the state of the art about IP and ML applications in the mining industry. furthermore, we propose a real time application for froth image analysis in the context of mineral processing. Finally, we propose some future directions, including suggestions on mining data collection and development of an exploration tool based on IP and ML algorithms by taking advantage of cloud computing technology to analyze geoscience data in order identify target areas with high prospectively potential.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129879899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ait Mouhou Abderrazzak, Saaidi Abderrahim, B. Majid, Abbad Khalid
{"title":"A study and implementation of the hand deformation using implicit skinning","authors":"Ait Mouhou Abderrazzak, Saaidi Abderrahim, B. Majid, Abbad Khalid","doi":"10.1109/ISACS48493.2019.9068914","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068914","url":null,"abstract":"In this paper, we propose a study and implementation of a skinning approach for the deformation of the virtual hand. This is the implicit skinning approach with signed distance functions, which represents a new skinning idea to correct errors introduced by approximations during the skinning process. Our work aims to apply this approach to the case of a virtual hand, and study the results to evaluate this technique.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121875252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelaziz Lberni, A. Ahaitouf, Malika Alami Marktani, A. Ahaitouf
{"title":"Sizing of second generation current conveyor using evolutionary algorithms","authors":"Abdelaziz Lberni, A. Ahaitouf, Malika Alami Marktani, A. Ahaitouf","doi":"10.1109/ISACS48493.2019.9068896","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068896","url":null,"abstract":"Evolutionary algorithms have been shown to be well adapted to solve multi-objective optimization problems. In this paper, two of them, will be applied to optimize the classical circuit of second generation current conveyor(CCII+). The optimization is performed in the framework of 0.181μm technology, and results are integrated in Cadence Virtuoso simulation tool to show the validity of the obtained results. Final design characteristics obtained by the two technics are in agreement and are better than the previously reported results in literature.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122155109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matrix solvers for flow simulation by the finite element method","authors":"Nacer E. El Kadri E., A. Chillali","doi":"10.1109/ISACS48493.2019.9068924","DOIUrl":"https://doi.org/10.1109/ISACS48493.2019.9068924","url":null,"abstract":"Following the finite element discretization of the Navier-Stokes equations we obtain a nonlinear matrix system. The resolution of this system by the iterative method of Newton-Raphson requires at each iteration the factorization of a matrix of the same size and the same structure as the matrix of the system. The storage space required for storage and the machine time required for their factorization become excessive. For industrial problems (3D problems or even in 2D), It is practically impossible to work with matrices, the memory space to store them is out of reach of current computers. To overcome this problem, the linear systems resulting from the Newton-Raphson algorithm are solved by the GMRES (Generalized Minimal RESidual) algorithm. The structure of the GMRES algorithm makes that we never have matrices to evaluate, but only the action of a matrix on a vector. Convergence is accelerated using a pre-conditioning technique. The diagonal pre-conditioning that we have developed is simple and effective.","PeriodicalId":312521,"journal":{"name":"2019 International Conference on Intelligent Systems and Advanced Computing Sciences (ISACS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122195678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}