{"id":25650,"date":"2024-04-23T12:13:34","date_gmt":"2024-04-23T12:13:34","guid":{"rendered":"https:\/\/www.univ-msila.dz\/site\/?page_id=25650"},"modified":"2024-09-04T11:38:37","modified_gmt":"2024-09-04T11:38:37","slug":"%d8%a7%d9%84%d9%85%d8%ac%d9%84%d8%a7%d8%aa-%d8%a7%d9%84%d8%b9%d9%84%d9%85%d9%8a%d8%a9-mi-2","status":"publish","type":"page","link":"https:\/\/www.univ-msila.dz\/site\/mi-ar\/%d8%a7%d9%84%d9%85%d8%ac%d9%84%d8%a7%d8%aa-%d8%a7%d9%84%d8%b9%d9%84%d9%85%d9%8a%d8%a9-mi-2\/","title":{"rendered":"\u0627\u0644\u0645\u062c\u0644\u0627\u062a \u0627\u0644\u0639\u0644\u0645\u064a\u0629 -MI"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25650\" class=\"elementor elementor-25650\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6e29d6 e-flex e-con-boxed e-con e-parent\" data-id=\"f6e29d6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ekit_has_onepagescroll_dot&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd05c27 elementor-widget elementor-widget-text-editor\" data-id=\"dd05c27\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong><span style=\"color: #ff6600\">\u0627\u0644\u0625\u0646\u062a\u0627\u062c \u0627\u0644\u0639\u0644\u0645\u064a \u0644\u0623\u0633\u0627\u062a\u0630\u0629 \u0643\u0644\u064a\u0629 \u0627\u0644\u0631\u064a\u0627\u0636\u064a\u0627\u062a \u0648\u0627\u0644\u0625\u0639\u0644\u0627\u0645 \u0627\u0644\u0622\u0644\u064a \u0644\u0633\u0646\u0629 2014<\/span><br \/><\/strong><\/h4><h5><strong><u>\u0639\u062f\u062f \u0627\u0644\u0623\u0648\u0631\u0627\u0642 \u0627\u0644\u0639\u0644\u0645\u064a\u0629(\u0645\u0646\u0634\u0648\u0631\u0627\u062a) : 16<br \/><\/u><\/strong><\/h5><table><tbody><tr><td style=\"background-color: #f2b078;text-align: center\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0639\u0627\u0645<\/strong><\/span><\/td><td style=\"background-color: #f2b078;text-align: center\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0631\u0642\u0645<\/strong><\/span><\/td><td style=\"background-color: #f2b078;text-align: center\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0648\u0631\u0642\u0629\u060c \u0627\u0644\u0645\u0624\u0644\u0641 \u060c \u0627\u0644\u0645\u0631\u062c\u0639<br \/><\/strong><\/span><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>1- <\/strong><\/td><td>Domination and factorization theorems for positive strongly p-summing operators. Positivity, 18, 4 (2014) 785-804.<strong><u>Auteurs <\/u><\/strong>: <strong>D. Achour , Blacel Amar<\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/link.springer.com\/article\/10.1007%2Fs11117-014-0276-6\" target=\"_blank\" rel=\"noopener\">http:\/\/link.springer.com\/article\/10.1007%2Fs11117-014-0276-6<\/a><\/td><\/tr><tr><td rowspan=\"2\"><p><strong>2014<\/strong><\/p><\/td><td rowspan=\"2\"><h1><span style=\"font-size: 12pt\">2-<\/span><\/h1><\/td><td><p>(q;r)-dominated holomorphic mappings<a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/link.springer.com\/journal\/13348\" target=\"_blank\" rel=\"noopener\">Collectanea Mathematica<\/a> 65, 1 (2014) 1-16.<\/p><p><strong><u>Auteurs <\/u><\/strong><strong>: D. Achour and <\/strong><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/link.springer.com\/search?facet-author=%22A.+T.+Bernardino%22\" target=\"_blank\" rel=\"noopener\"><strong>A. T. Bernardino<\/strong><\/a><\/p><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/link.springer.com\/article\/10.1007%2Fs13348-012-0073-0\" target=\"_blank\" rel=\"noopener\">http:\/\/link.springer.com\/article\/10.1007%2Fs13348-012-0073-0<\/a><\/td><\/tr><tr><td rowspan=\"2\"><p><strong>2014<\/strong><\/p><\/td><td rowspan=\"2\"><strong>3- <\/strong><\/td><td><p>Factorization of strongly (p, \u03c3)-continuousmultilinearoperators.<\/p><h2><span style=\"font-size: 12pt\">Linear and MultilinearAlgebra .60, 12 (2014) 1649-1670.<\/span><\/h2><p><strong><u>Auteurs <\/u><\/strong><strong>: D. Achour ,Dahia elhadj, P. Rueda and E.A. S\u00e1nchez P\u00e9rez.<\/strong><\/p><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/03081087.2013.839677\" target=\"_blank\" rel=\"noopener\">http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/03081087.2013.839677<\/a>.<\/td><\/tr><tr><td rowspan=\"2\"><p><strong>2014<\/strong><\/p><\/td><td rowspan=\"2\"><strong>4- <\/strong><\/td><td>Stability and convergence resultats for Picard and Mann iterations via general contractive condition of integral type. Octogon Mathematical Magazine. Vol. 22, N1, April 2014, pp 80-92.<strong><u>Auteurs<\/u><\/strong><strong>: D. Achour, M. T. Belaiband O. Olatinwo.<\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.uni-miskolc.hu\/matsefi\/Octogon\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.uni-miskolc.hu\/matsefi\/Octogon\/<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>5- <\/strong><\/td><td>Criterion of Decomposition of Unlimited Integer According to the Model: N=(standard)+(Unlimited)x(Unlimited), International Conference on Algebra and Number Theory, 5-8 August 2014, Turkey.<strong><u>Auteurs :<\/u><\/strong> <strong>S. Badidja and A.Boudaoud, <\/strong><\/td><\/tr><tr><td>\u00a0<\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>6- <\/strong><\/td><td><em>Verification Approach for Probabilistic Complex Event Processing (cep) Applications. In <strong>The First International Symposium on Informatics and its<br \/>Applications<\/strong>, M\u2019sila, 2014<\/em><strong><u>Auteurs :<\/u><\/strong> <strong>H. Debbi, M. Bourahla<\/strong>.<\/td><\/tr><tr><td>\u00a0<\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>7- <\/strong><\/td><td><em>Diagnosis of probabilistic models using causality and regression,. in <strong>Proceedings of the 8th International Workshop on Verification and Evaluation of Computer and Communication<\/strong><br \/>Systems, 34\u201344, 2014<\/em><strong><u>Auteurs :<\/u><\/strong> <strong>H. Debbi<\/strong><strong>.<\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/ceur-ws.org\/Vol-1256\/paper3.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/ceur-ws.org\/Vol-1256\/paper3.pdf<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>8- <\/strong><\/td><td><em>Two-dimensional cavitating flow past an oblique plate in a channel<\/em>. <strong>Journal of Computational and Applied Mathematics<\/strong>. 259, 828-834 (2014).<strong><u>Auteurs :<\/u><\/strong> <strong>Abedelkader GASMI<\/strong>.<\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0377042713003798\" target=\"_blank\" rel=\"noopener\">http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0377042713003798<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>9- <\/strong><\/td><td><em>Numerical Study of Two-Dimensional Jet Flow Issuing from a Funnel<\/em>. <strong>Springer Proceedings in Mathematics &amp; Statistics<\/strong>. <em>87<\/em>, <em>161-169<\/em> (2014). <strong><u>Auteurs :<\/u><\/strong> <strong>Abedelkader GASMI<\/strong>.<\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-06923-4_15\" target=\"_blank\" rel=\"noopener\">http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-06923-4_15<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>10- <\/strong><\/td><td>Language Identification: A New Fast Algorithm to Identify the Language of a Text in a Multilingual Corpus, The 4<sup>th<\/sup>International Conference on Multimedia Computing and Systems ICMCS\u201914, IEEE Conference, University of Marrakesh, Marrakesh, Morocco, 14-16 Avril 2014.<strong><u>Auteurs : <\/u><\/strong><strong>Said K., Abdelouahab M., Linda B-F. <\/strong><\/td><\/tr><tr><td>IEEE Explorer Library: <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/ieeexplore.ieee.org\/search\/searchresult.jsp?newsearch=true&amp;queryText=Said%20Gadri&amp;fname=&amp;mname=&amp;lname=&amp;title=&amp;volume=&amp;issue=&amp;spage\" target=\"_blank\" rel=\"noopener\">http:\/\/ieeexplore.ieee.org\/search\/searchresult.jsp?newsearch=true&amp;queryText=Said%20Gadri&amp;fname=&amp;mname=&amp;lname=&amp;title=&amp;volume=&amp;issue=&amp;spage<\/a>=<\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>11- <\/strong><\/td><td><p><em>Composition operators acting on Besov spaces on the real line.<\/em>Annali di Matematica (2014) 193:1519\u20131554,<\/p><p>DOI 10.1007\/s10231-013-0342-x 239\u2013272.<\/p><p><strong><u>Auteurs :<\/u><\/strong> <strong>G. Bourdaud, M.Moussai, W. Sickel<\/strong><\/p><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/link.springer.com\/content\/pdf\/10.1007%2Fs10231-013-0342-x.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/link.springer.com\/content\/pdf\/10.1007%2Fs10231-013-0342-x.pdf<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>12- <\/strong><\/td><td><p>Improved Tabu Search for Parallel Identical Machines with Availability Zones (Tz, Sz)Res. J. App. Sci. Eng. Technol., 8(3): 423-428, 2014<\/p><p><strong><u>Auteurs :<\/u><\/strong> <strong>SELET Omar.<\/strong><\/p><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.maxwellsci.com\/print\/rjaset\/v8-423-428.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/www.maxwellsci.com\/print\/rjaset\/v8-423-428.pdf<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>13- <\/strong><\/td><td>A COMPARATIVE STUDY OF HEURISTIC AND METAHEURISTIC FOR THREE IDENTICAL PARALLEL MACHINES SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3147-3153, October 2014<strong><u>Auteurs :<\/u><\/strong> <strong>SELET Omar.<\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.cjpas.net\/wp-content\/uploads\/pdfs\/8\/3\/Paper%20(20).pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/www.cjpas.net\/wp-content\/uploads\/pdfs\/8\/3\/Paper%20(20).pdf<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>14- <\/strong><\/td><td><em>Development of a New Data Fusion System for Segmentation of Mr Images<\/em>. Journal of Circuits, Systems, and Computers. 23(6), 1-14 (2014).<strong><u>Auteurs :<\/u><\/strong> <strong>C. Lamiche, and A. Moussaoui.<\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126614500789\" target=\"_blank\" rel=\"noopener\">http:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126614500789<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>15- <\/strong><\/td><td><em>A cooperative method to improve segmentation of brain MR images.<\/em> NEW TRENDS IN MATHEMATICAL SCIENCES. 2(2), 134-140 (2014).<strong><u>Auteurs :<\/u><\/strong> <strong>C. Lamiche, and A. Moussaoui.<\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.wseas.org\/multimedia\/journals\/computers\/2015\/a945705-685.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/www.wseas.org\/multimedia\/journals\/computers\/2015\/a945705-685.pdf<\/a><\/td><\/tr><tr><td rowspan=\"2\"><strong>2014<\/strong><\/td><td rowspan=\"2\"><strong>16- <\/strong><\/td><td><em>An Adaptive Tabu Search Algorithm for Obtaining Alignment of Multiple Sequences<\/em>. Baltic J. Modern Computing. 2(2), 75-83 (2014).<strong><u>Auteurs :<\/u><\/strong> <strong>C. Lamiche, and A. Moussaoui.<\/strong><\/td><\/tr><tr><td>http:\/\/www.bjmc.lu.lv\/contents\/vol-22014-no-2\/<\/td><\/tr><\/tbody><\/table><h4><span style=\"color: #ff6600\"><strong>\u0627\u0644\u0625\u0646\u062a\u0627\u062c \u0627\u0644\u0639\u0644\u0645\u064a \u0644\u0623\u0633\u0627\u062a\u0630\u0629 \u0643\u0644\u064a\u0629 \u0627\u0644\u0631\u064a\u0627\u0636\u064a\u0627\u062a \u0648\u0627\u0644\u0625\u0639\u0644\u0627\u0645 \u0627\u0644\u0622\u0644\u064a \u0644\u0633\u0646\u0629 2015<\/strong><\/span><\/h4><h5><strong><u>\u0639\u062f\u062f \u0627\u0644\u0623\u0648\u0631\u0627\u0642 \u0627\u0644\u0639\u0644\u0645\u064a\u0629(\u0645\u0646\u0634\u0648\u0631\u0627\u062a) : 36<\/u><\/strong><\/h5><table><tbody><tr><td style=\"background-color: #f2b078;text-align: center\" width=\"79\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0639\u0627\u0645<\/strong><\/span><\/td><td style=\"background-color: #f2b078;text-align: center\" width=\"54\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0631\u0642\u0645<\/strong><\/span><\/td><td style=\"background-color: #f2b078;text-align: center\" width=\"579\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0648\u0631\u0642\u0629\u060c \u0627\u0644\u0645\u0624\u0644\u0641 \u060c \u0627\u0644\u0645\u0631\u062c\u0639<\/strong><\/span><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>1- <\/strong><\/td><td width=\"579\">Virtually (r;r1,\u2026 ,rn;s)-nuclear multilinear operators<br \/>Extracta Math. 30(2) (2015), 235-250<strong><u>Auteurs <\/u><\/strong>: <strong>D. ACHOUR, A. BELACEL<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.eweb.unex.es\/eweb\/extracta\/Vol-30-2\/30B2Achour.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/www.eweb.unex.es\/eweb\/extracta\/Vol-30-2\/30B2Achour.pdf<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><p><strong>2015<\/strong><\/p><\/td><td rowspan=\"2\" width=\"54\"><h1><span style=\"font-size: 12pt\">2-<\/span><\/h1><\/td><td width=\"579\">MANY VALUED LOGIC AND INTUITIONISTIC FUZZY SETS: A STONE THEOREM GENERALIZATIONMANY VALUED LOGIC AND INTUITIONISTIC FUZZY SETS: A STONE THEOREM GENERALIZATION<strong><u>Auteurs :<\/u><\/strong> <strong>A. Abdelazeiz.<\/strong><\/td><\/tr><tr><td width=\"579\">Honam Mathematical Journal, v.37, no.3, 269-279, September 2015<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><p><strong>2015<\/strong><\/p><\/td><td rowspan=\"2\" width=\"54\"><strong>3- <\/strong><\/td><td width=\"579\">Szpilrajn theorem for intuitionistic fuzzy orderings.<strong><u>Auteurs :<\/u><\/strong> <strong>Lemnaouar Zedam , A . Amroune and B. Davvaz.<\/strong><\/td><\/tr><tr><td width=\"579\">Annals of Fuzzy Mathematics and Informatics <strong>9 (5), 703-718 (2015).<\/strong><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.afmi.or.kr\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.afmi.or.kr\/<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><p><strong>2015<\/strong><\/p><\/td><td rowspan=\"2\" width=\"54\"><strong>4- <\/strong><\/td><td width=\"579\"><em>Analysis and approximation of frictionless contact problems between two piezoelectric bodies with adhesion.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong>Tedjai, H.A., Benabderrahmane, B. &amp; Drabla, S.<\/strong><\/td><\/tr><tr><td width=\"579\"><strong><em>Kuwait J. Sci. <\/em><\/strong><strong>42 (1) <\/strong>pp. 31-54, 2015 (2015).http:\/\/journals.ku.edu.kw\/kjs\/index.php\/KJS\/<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>5- <\/strong><\/td><td width=\"579\">A nonlinear hyperbolic problem for viscoelastic equation,<strong><u>Auteurs :<\/u><\/strong> <strong>A, Rahmoune, B, Benabderrahmane &amp; B, Nouiri<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>Palestinian Journal of Mathematics<\/strong><strong> (PJM)<\/strong>, Vol.4(1)pp. 1-11, (2015).http:\/\/pjm.ppu.edu\/<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>6- <\/strong><\/td><td width=\"579\">Improvement of 2-Partition Entropy Approach Using Type-2 Fuzzy Sets for Image Thresholding.<strong><u>Auteurs :<\/u><\/strong> <strong>A.Ouarda.<\/strong><\/td><\/tr><tr><td width=\"579\">International Journal of Applied Evolutionary Computation, 6(3), 33-48, July-September 2015 33<a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.igi-global.com\/article\/improvement-of-2-partition-entropy-approach-using-type-2-fuzzy-sets-for-image-thresholding\/136068\" target=\"_blank\" rel=\"noopener\">http:\/\/www.igi-global.com\/article\/improvement-of-2-partition-entropy-approach-using-type-2-fuzzy-sets-for-image-thresholding\/136068<\/a> DOI: 10.4018\/IJAEC.2015070103<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>7- <\/strong><\/td><td width=\"579\">Traveling profiles solutions to heat equation with a power- law nonlinearity<strong><u>Auteurs :<\/u><\/strong> <strong>Arioua Yacine, Benhamidouche Nouredine.<\/strong><\/td><\/tr><tr><td width=\"579\">Journal of advanced research in applied mathematics \u2013 Vol. 7, Issue. 4, 2015, pp. 1-6 doi: 10.5373\/jaram.2243.122914ISSN 1942-9649 \u2013 https:\/\/i-asr.com\/Journals\/jaram<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>8- <\/strong><\/td><td width=\"579\">Non-classical study on the simultaneous Rational approximation.<strong><u>Auteurs :<\/u><\/strong> <strong>Dj. Bellaouar and A. Boudaoud.<\/strong><\/td><\/tr><tr><td width=\"579\">Malaysian journal of mathematical sciences, 9(2), 209-225.http:\/\/einspem.upm.edu.my\/journal<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>9- <\/strong><\/td><td width=\"579\">A nonstandard construction of an N\u03b1-universal set.<strong><u>Auteurs :<\/u><\/strong> <strong>A. Boudaoud.<\/strong><\/td><\/tr><tr><td width=\"579\">International Meeting AMS (american mathematical society)\/EMS(european mathematical society)\/SPM(sociedade portuguesa de mathematica), 10-13 June, Porto (Portugal).E-mail: spm@spm.pt<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>10- <\/strong><\/td><td width=\"579\"><em>A mono crossover genetic algorithm for TSP.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong>A.Hemmak , B. BOUDERAH.<\/strong><\/td><\/tr><tr><td width=\"579\"><em>Global Journal on Technology<\/em>, Issue 7 (2015).http:\/\/www.world-education-center.org\/index.php\/P-ITCS\/article\/viewArticle\/3462<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>11- <\/strong><\/td><td width=\"579\">Repairing Errors in PRISM Programs Using Probabilistic Abduction Reasoning.<strong><u>Auteurs :<\/u><\/strong> <strong>Mustapha BOURAHLA.<\/strong><\/td><\/tr><tr><td width=\"579\"><em>Lecture Notes in Computer Science (LNCS) 9344<\/em><em>,Springer.<\/em><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/dx.doi.org\/10.1007\/978-3-319-23781-7_4\" target=\"_blank\" rel=\"noopener\">http:\/\/dx.doi.org\/10.1007\/978-3-319-23781-7_4<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>12- <\/strong><\/td><td width=\"579\">Reasoning over Vague Concepts.<strong><u>Auteurs :<\/u><\/strong> <strong>Mustapha BOURAHLA.<\/strong><\/td><\/tr><tr><td width=\"579\"><em>Lecture Notes in Artificial Intelligence (LNAI) 9120, <\/em><em>Springer.<\/em><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.springer.com\/gp\/book\/9783319193687\" target=\"_blank\" rel=\"noopener\">http:\/\/www.springer.com\/gp\/book\/9783319193687<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>13- <\/strong><\/td><td width=\"579\">Exact Reasoning for Imprecise Ontologies.<strong><u>Auteurs :<\/u><\/strong> <strong>Mustapha BOURAHLA.<\/strong><\/td><\/tr><tr><td width=\"579\"><em>IFIP International Federation for Information Processing AICT (Springer) 456.<\/em><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.springer.com\/gp\/book\/9783319195773\" target=\"_blank\" rel=\"noopener\">http:\/\/www.springer.com\/gp\/book\/9783319195773<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>14- <\/strong><\/td><td width=\"579\">Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem.<strong><u> Auteurs :<\/u><\/strong> <strong>Noureddine Chikouche<\/strong><strong>, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed.<\/strong><\/td><\/tr><tr><td width=\"579\">I. J. Network Security 17(4), 413-422 (2015).http:\/\/ijns.femto.com.tw\/contents\/ijns-v17-n4\/ijns-2015-v17-n4-p413-422.pdf<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>15- <\/strong><\/td><td width=\"579\">A Secure Code-Based Authentication Scheme for RFID Systems.<strong><u>Auteurs :<\/u><\/strong> <strong>Noureddine Chikouche<\/strong><strong>, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed.<\/strong><\/td><\/tr><tr><td width=\"579\">International Journal of Computer Network and Information Security (IJCNIS). 7(9), 1-9 (2015).http:\/\/www.mecs-press.org\/ijcnis\/ijcnis-v7-n9\/IJCNIS-V7-N9-1.pdf<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>16- <\/strong><\/td><td width=\"579\"><em>Some properties of variable Besov-type spaces<\/em>.<strong><u>Auteurs :<\/u><\/strong> <strong>D. Drihem.<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/projecteuclid.org\/euclid.facm\" target=\"_blank\" rel=\"noopener\">Funct. Approx. Comment. Math.<\/a> Volume 52, <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/projecteuclid.org\/euclid.facm\/1434650875\" target=\"_blank\" rel=\"noopener\">Number 2<\/a> (2015), 193-221.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>17- <\/strong><\/td><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/projecteuclid.org\/euclid.afa\/1435764016\" target=\"_blank\" rel=\"noopener\"><em>Some characterizations of variable Besov-type spaces<\/em><\/a>.<strong><u>Auteurs :<\/u><\/strong> <strong>D. Drihem.<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/projecteuclid.org\/afa\" target=\"_blank\" rel=\"noopener\">Annals of Functional Analysis<\/a>. Volume 6, <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/projecteuclid.org\/euclid.afa\/1435763998\" target=\"_blank\" rel=\"noopener\">Number 4<\/a> (2015), 255-288.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>18- <\/strong><\/td><td width=\"579\"><strong>Multilingual Text Categorization: Increasing the Quality of Categorization by a Statistical Stemming Approach<\/strong>.<strong><u>Auteurs :<\/u><\/strong> <strong>Said G.<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>International Conference on intelligent Information Processing Security and Advanced Communication (IPAC 2015), ACM Conference, November 23-25, 2015 Batna, Algeria.<\/strong><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/ipac.awict.net\/Accepted_Papers.html\" target=\"_blank\" rel=\"noopener\">http:\/\/ipac.awict.net\/Accepted_Papers.html<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>19- <\/strong><\/td><td width=\"579\">Multilingual information retrieval: increasing the effectiveness of search by stemming, 19th International Conference onCircuits, Systems.<strong><u>Auteurs :<\/u><\/strong> <strong>Said G., Abdelouahab M.<\/strong><\/td><\/tr><tr><td width=\"579\">Communications and Computers (CSCC 2015), July 16-20, 2015, Zakynthos Island, Greece.<a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/2015.cscc.co\/\" target=\"_blank\" rel=\"noopener\">http:\/\/2015.cscc.co\/<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>20- <\/strong><\/td><td width=\"579\"><strong>Information Retrieval: A New Multilingual Stemmer Based on a Statistical Approach.<\/strong><strong><u>Auteurs :<\/u><\/strong> <strong>Said G., Abdelouahab M.<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>3<sup>rd<\/sup> International Conference on control, engineering &amp; information Technology (CEIT2015), 25-27 may, IEEE Conference, Tlemcen, Algeria.<\/strong>IEEE Explorer Library: <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/ieeexplore.ieee.org\/search\/searchresult.jsp?newsearch=true&amp;queryText=Said%20Gadri&amp;fname=&amp;mname=&amp;lname=&amp;title=&amp;volume=&amp;issue=&amp;spage\" target=\"_blank\" rel=\"noopener\">http:\/\/ieeexplore.ieee.org\/search\/searchresult.jsp?newsearch=true&amp;queryText=Said%20Gadri&amp;fname=&amp;mname=&amp;lname=&amp;title=&amp;volume=&amp;issue=&amp;spage<\/a>=<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>21- <\/strong><\/td><td width=\"579\"><strong>Arabic Texts Categorization: Features Selection Based on the Extraction of Words\u2019 Roots<\/strong><strong><u> Auteurs :<\/u><\/strong> <strong>Said G., Abdelouahab M.<\/strong><\/td><\/tr><tr><td width=\"579\"><p><strong>5th IFIP International Conference on Computer Science and its Applications(CIIA\u20192015), 20, 21 May 2015, Springer Conference, TaharMoulay University, Saida \u2013 Algeria.<\/strong>Conference Link : <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/ciia2015.ensma.fr\/\" target=\"_blank\" rel=\"noopener\">http:\/\/ciia2015.ensma.fr\/<\/a><\/p><p>Springer Link: <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/link.springer.com\/search?query=said+gadri&amp;search-within=Book&amp;facet-book-doi=10.1007%2F978-3-319-19578-0\" target=\"_blank\" rel=\"noopener\">http:\/\/link.springer.com\/search?query=said+gadri&amp;search-within=Book&amp;facet-book-doi=10.1007%2F978-3-319-19578-0<\/a><\/p><p>La base DBLP: <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/dblp.uni-trier.de\/search?q=Said+Gadri\" target=\"_blank\" rel=\"noopener\">http:\/\/dblp.uni-trier.de\/search?q=Said+Gadri<\/a><\/p><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>22- <\/strong><\/td><td width=\"579\">.: A new Multilingual Stemmer Based on the Extraction of the Root and the N-grams Technique.<strong><u>Auteurs :<\/u><\/strong> <strong>Said G., Abdelouahab M.<\/strong><\/td><\/tr><tr><td width=\"579\">ICIPCE\u20192015 International Conference on Information Processing and Control Engineering, 15-17th, April, Moscow, Russia.Conference link: <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.icipce2015.org\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.icipce2015.org<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>23- <\/strong><\/td><td width=\"579\">An Effective Multilingual Stemmer Based on the Extraction of the Root and the N-grams Technique.<strong><u>Auteurs :<\/u><\/strong> <strong>Said G., Abdelouahab M.<\/strong><\/td><\/tr><tr><td width=\"579\">AIST\u20192015 international scientific conference Analysis of Images, Social networks, and Texts, 9-11th, April, Springer Conference, Yekaterinburg, Russia.Conference Link: <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/aistconf.org\/\" target=\"_blank\" rel=\"noopener\">http:\/\/aistconf.org\/<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>24- <\/strong><\/td><td width=\"579\">A Prospect Proof of the Goldbach\u2019s Conjecture.<strong><u>Auteurs :<\/u><\/strong> <strong>M. Douadi<\/strong><\/td><\/tr><tr><td width=\"579\">2015-05-26 http:\/\/vixra.org\/viXra:1505.0203.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>25-<\/strong><\/td><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/ieeexplore.ieee.org.www.sndl1.arn.dz\/xpl\/articleDetails.jsp?arnumber=7338095&amp;queryText=Zedam&amp;newsearch=true\" target=\"_blank\" rel=\"noopener\"><em>On intuitionistic fuzzy lattices<\/em><\/a><em>.<\/em><strong><u>Auteurs : <\/u><\/strong><strong>S. Milles, E. Rak and L. Zedam.<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/ieeexplore.ieee.org.www.sndl1.arn.dz\/xpl\/mostRecentIssue.jsp?punumber=7329077\" target=\"_blank\" rel=\"noopener\"><strong>Fuzzy Systems (FUZZ-IEEE)<\/strong>. <\/a> DOI: <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/dx.doi.org.www.sndl1.arn.dz\/10.1109\/FUZZ-IEEE.2015.7338095\" target=\"_blank\" rel=\"noopener\">10.1109\/FUZZ-IEEE.7338095<\/a>(2015).http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=7338095<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>26-<\/strong><\/td><td width=\"579\"><p><em>Realizations of homogeneous Besov and Triebel\u2013Lizorkin spaces<\/em><em>and an application to pointwise multipliers.<\/em><\/p><p><strong><u>Auteurs<\/u><\/strong><u> <\/u><strong><u>:<\/u><\/strong> <strong> M.Moussai <\/strong><\/p><\/td><\/tr><tr><td width=\"579\"><p><strong>Analysis and Applications 13 No. 2 (2015), 149\u2013183. <\/strong><strong> DOI: 10.1142\/S0219530514500250<\/strong><strong> .<\/strong><\/p><p>http:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219530514500250?src=recsys&journalCode=aa<\/p><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>27-<\/strong><\/td><td width=\"579\">History-dependent Evolutionary Quasi-variational Inequalities with Viscosity and Volterra Integral Term.<strong><u>Auteurs :<\/u><\/strong> <strong>NOUIRI Brahim<\/strong><\/td><\/tr><tr><td width=\"579\">Journal of Mathematical Sciences, 2 (2015) 190-195.<a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/bettyjonespub.com\/contactus_math.html\" target=\"_blank\" rel=\"noopener\">http:\/\/bettyjonespub.com\/contactus_math.html<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>28-<\/strong><\/td><td width=\"579\"><em>A Hybrid Method Applied to Multiple Sequence Alignment Problem<\/em>.<strong><u>Auteurs :<\/u><\/strong> <strong>C. L<\/strong><strong>amiche, and A. Moussaoui.<\/strong><\/td><\/tr><tr><td width=\"579\">WSEAS TRANSACTIONS on COMPUTERS 14, 465-473 (2015).<a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.wseas.org\/multimedia\/journals\/computers\/2015\/a945705-685.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/www.wseas.org\/multimedia\/journals\/computers\/2015\/a945705-685.pdf<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>29-<\/strong><\/td><td width=\"579\"><em>An efficient tabu search method for multiple sequence alignment.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong>C. L<\/strong><strong>amiche, and A. Moussaoui.<\/strong><\/td><\/tr><tr><td width=\"579\">Global Journal on Technology. 7, 30-35 (2015).<a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.world-education-center.org\/index.php\/P-ITCS\/article\/view\/3450\/3152\" target=\"_blank\" rel=\"noopener\">http:\/\/www.world-education-center.org\/index.php\/P-ITCS\/article\/view\/3450\/3152<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\">\u00a0<\/td><td rowspan=\"2\" width=\"54\">\u00a0<\/td><td width=\"579\"><em>CONTINUITY OF THE FREE BOUNDARY IN ELLIPTIC<\/em> <em> PROBLEMS WITH NEUMAN BOUNDARY CONDITION.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong>A. SAADI.<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>Electronic Journal of Diferential Equations, Vol. 2015 (2015), No. 160, pp. 1-16.<\/strong>.http:\/\/www.raco.cat\/index.php\/CollectaneaMathematica\/article\/view\/56549<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>30-<\/strong><\/td><td width=\"579\"><em>The Columbus Moorish connection.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong> L. <\/strong><strong>Belabdelouahab-Fernini<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>Les Actes des XV et XVIe Symposiums d\u2019Etudes Morisques , Les Nouvelles Voies de la moriscologie, N 33, May, 2015, pp. 91-108.<\/strong><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>31-<\/strong><\/td><td width=\"579\"><em>Moorish stimulus to European Renaissance.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong> L. <\/strong><strong>Belabdelouahab-Fernini<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>El Ihyaa N 17-18 2014-2015, pp. 27-46.<\/strong><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>32-<\/strong><\/td><td width=\"579\"><em>Description and implementation of a new protocol for remote desktop technology using java programming language.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong>Lekhali Soumia, Linda Belabdelouahab-Fernini, Tayoub Walid.<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>International Journal of Computer Science and Information Security, December, 2015.<\/strong><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>33-<\/strong><\/td><td width=\"579\"><em>The Literary Dimension of the Algerian-American War.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong> L. <\/strong><strong>Belabdelouahab-Fernini<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>Revue D\u2019Histoire Maghrebine, N. 158 pp. 41-52, February, 2015.<\/strong><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>34-<\/strong><\/td><td width=\"579\">Properties of continuous maps and bounded linear operators in fuzzy normed spaces.<strong><u>Auteurs :<\/u><\/strong> <strong>Abdulgawad A.Q. Al-Qubati, Lemnaouar Zedam.<\/strong><\/td><\/tr><tr><td width=\"579\"><p><strong>Journal of Intelligent and Fuzzy systems. 29 (2), 127\u2013133 (2015).<\/strong><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/content.iospress.com\/articles\/journal-of-intelligent-and-fuzzy-systems\/ifs1576\" target=\"_blank\" rel=\"noopener\">http:\/\/content.iospress.com\/articles\/journal-of-intelligent-and-fuzzy-systems\/ifs1576<\/a><\/p><p>DOI: 10.3233\/IFS-151576<\/p><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>35-<\/strong><\/td><td width=\"579\">Left and right compatibility of strict orders with fuzzy tolerance and fuzzy equiovalences relations.<strong><u>Auteurs :<\/u><\/strong> <strong>B. De Baets, Lemnaouar Zedam and A. Kheniche. <\/strong><\/td><\/tr><tr><td width=\"579\"><p><strong>Atlantis Press.<\/strong><strong>ISBN: 978-94-62520-77-6 <\/strong><\/p><p><strong>doi:10.2991\/ifsa-eusflat-15.2015.221<\/strong><\/p><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2015<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>36-<\/strong><\/td><td width=\"579\">Distributivity of Aggregations operators with 2-ineutral elements.<strong><u>Auteurs :<\/u><\/strong> <strong>Pawel Drygas, Ewa Rak and Lemnaouar ZEDAM<\/strong><\/td><\/tr><tr><td width=\"579\"><strong>TOTEM.COM.PL SP. z o.o.<\/strong> <strong>pp. 109-114.<\/strong><strong>ISBN: 978-83-8012-519-3<\/strong><\/td><\/tr><\/tbody><\/table><h4><span style=\"color: #ff6600\"><strong>\u0627\u0644\u0625\u0646\u062a\u0627\u062c \u0627\u0644\u0639\u0644\u0645\u064a \u0644\u0623\u0633\u0627\u062a\u0630\u0629 \u0643\u0644\u064a\u0629 \u0627\u0644\u0631\u064a\u0627\u0636\u064a\u0627\u062a \u0648\u0627\u0644\u0625\u0639\u0644\u0627\u0645 \u0627\u0644\u0622\u0644\u064a \u0644\u0633\u0646\u0629 2016<\/strong><\/span><\/h4><h5><strong><u>\u0639\u062f\u062f \u0627\u0644\u0623\u0648\u0631\u0627\u0642 \u0627\u0644\u0639\u0644\u0645\u064a\u0629(\u0645\u0646\u0634\u0648\u0631\u0627\u062a) : 24<\/u><\/strong><\/h5><table><tbody><tr><td style=\"background-color: #f2b078;text-align: center\" width=\"79\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0639\u0627\u0645<\/strong><\/span><\/td><td style=\"background-color: #f2b078;text-align: center\" width=\"54\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0631\u0642\u0645<\/strong><\/span><\/td><td style=\"background-color: #f2b078;text-align: center\" width=\"579\"><span style=\"color: #ffffff\"><strong>\u0627\u0644\u0648\u0631\u0642\u0629\u060c \u0627\u0644\u0645\u0624\u0644\u0641 \u060c \u0627\u0644\u0645\u0631\u062c\u0639<\/strong><\/span><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>1- <\/strong><\/td><td width=\"579\"><p>Absolutely summing Lipschitz conjugates.Mediterr. J. Math. DOI 10.1007\/s00009-015-0623-2.<\/p><p><strong><u>Auteurs :<\/u><\/strong> <strong>Y. Rachid, D. Achour and P. Rueda.<\/strong><\/p><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/link.springer.com\/article\/10.1007%2Fs00009-015-0623-2\" target=\"_blank\" rel=\"noopener\">http:\/\/link.springer.com\/article\/10.1007%2Fs00009-015-0623-2<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><p><strong>2016<\/strong><\/p><\/td><td rowspan=\"2\" width=\"54\"><h1><span style=\"font-size: 12pt\">2-<\/span><\/h1><\/td><td width=\"579\"><p>Domination spaces and factorization of linear and multilinear summing operators.<\/p><p><strong><u>Auteurs :<\/u><\/strong> <strong>D. Achour , E. Dahia, P. Rueda, E.A. S\u00e1nchez P\u00e9rez<\/strong>.<\/p><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/arxiv.org\/abs\/1506.06311\" target=\"_blank\" rel=\"noopener\">http:\/\/arxiv.org\/abs\/1506.06311<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><p><strong>2016<\/strong><\/p><\/td><td rowspan=\"2\" width=\"54\"><strong>3- <\/strong><\/td><td width=\"579\">Lipschitz operator ideals and the approximation property. J. Math. Anal. Appl. 436 (2016) 217{236.<strong><u>Auteurs :<\/u><\/strong> <strong>D. Achour, P. Rueda, E.A. Sanchez-Perez and R.Yahi.<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0022247X15011002\" target=\"_blank\" rel=\"noopener\">http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0022247X15011002<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><p><strong>2016<\/strong><\/p><\/td><td rowspan=\"2\" width=\"54\"><strong>4- <\/strong><\/td><td width=\"579\">(p;sigma)-Absolutely Lipschitz operators (2016).<strong><u>Auteurs :<\/u><\/strong> <strong>D. Achour, P. Rueda and R. Yahi.<\/strong><\/td><\/tr><tr><td width=\"579\">To appear in Annals of Functional Analysis.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>5- <\/strong><\/td><td width=\"579\"><em>Polynomial Decay and Blow Up of Solutions for Variable Coefficients Viscoelastic Wave Equation with Acoustic Boundary Conditions, <strong>Acta Mathematica Snica, English Series<\/strong>,<\/em> Vol. 32 (2): 137-152, (2016).<strong><u>Auteurs :<\/u><\/strong> <strong>Yamna BOUKHATEM, Benyattou BENABDERRAHMANE<\/strong><\/td><\/tr><tr><td width=\"579\">http:\/\/123.57.41.99\/Jwk_sxxb_en\/EN\/volumn\/volumn_2066.shtml<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>6- <\/strong><\/td><td width=\"579\"><em>High Lightweight Encryption Standard (HLES) as an Improvement of 512-Bit AES for Secure Multimedia.<\/em> IJACSA, 2016; 7(1).<strong><u>Auteurs :<\/u><\/strong> <strong>S. Guesmia Seyf Eddine, O. Assas, B. BOUDERAH. <\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/https:\/\/sites.google.com\/a\/thesai.org\/ijacsa\/current-issu..%20%20Vol%207%20N2\" target=\"_blank\" rel=\"noopener\">https:\/\/sites.google.com\/a\/thesai.org\/ijacsa\/current-issu.. Vol 7 N2<\/a> 2016<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>7- <\/strong><\/td><td width=\"579\">\u00ab <em>New Properties for Solving the Single Machine Scheduling Problem with Early\/Tardy Jobs \u00bb Journal of Intelligent Systems <\/em>(JISYS). Germany(2016). JISYS.2016.0063.R1 \u2013 Decision Accept 31-May-2016.<strong><u>Auteurs : <\/u><\/strong><strong>A.Hemmak<\/strong>, <strong>B. BOUDERAH<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.degruyter.com\/view\/j\/jisys\" target=\"_blank\" rel=\"noopener\">http:\/\/www.degruyter.com\/view\/j\/jisys<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>8- <\/strong><\/td><td width=\"579\"><p><em>A Novel Algorithm for Pattern Matching Based on Modified Push-Down Automata<\/em> , Vol. 32Issue 2, Mar 2016.<\/p><p><strong><u>Auteurs :<\/u><\/strong> <strong>B.Lounnas , B BOUDERAH , A Moussaoui<\/strong><\/p><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.iis.sinica.edu.tw\/page\/jise\/2016\/201603_09.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.iis.sinica.edu.tw\/page\/jise\/2016\/201603_09.html<\/a> Mar 2016,<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>9- <\/strong><\/td><td width=\"579\">Reasoning over decomposing fuzzy description logic, <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.sciencedirect.com\/science\/journal\/23526645\" target=\"_blank\" rel=\"noopener\">Journal of Innovation in Digital Ecosystems<\/a>.<strong><u>Auteurs :<\/u><\/strong> <strong>Gasmi Mohamed et Bourahla Mustapha.<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352664516300049\" target=\"_blank\" rel=\"noopener\">http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352664516300049<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>10- <\/strong><\/td><td width=\"579\"><em>Notes on the Herz-type Hardy spaces of variable smoothness and integrability<\/em>.<strong><u>Auteurs :<\/u><\/strong> <strong>D. Drihem<\/strong>, F. Seghiri<\/td><\/tr><tr><td width=\"579\">Mathematical Inequalities and Applications, Volume 19, Number 1 (2016), 145-165.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>11- <\/strong><\/td><td width=\"579\"><em>Characterizations of Besov-type spaces with variable smoothness and integrability by ball means of differences<\/em>,<strong><u>Auteurs :<\/u><\/strong> <strong>D. Drihem.<\/strong><\/td><\/tr><tr><td width=\"579\">Kyoto Journal of Mathematics, Vol. 56, No. 3 (2016), 655-680.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>12- <\/strong><\/td><td width=\"579\">Arabic Text Categorization: An Improved Algorithm Based on N-grams technique to Extract Arabic Words Roots,<strong><u>Auteurs :<\/u><\/strong> Said G., Abdelouahab M<\/td><\/tr><tr><td width=\"579\">International Arab Journal of Information Technology IAJIT (ISI Thomson, IF: 0.582, Jordan), accepted for publication, Vol.15, No.02, March 2018.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>13- <\/strong><\/td><td width=\"579\">Application of a New Set of Pseudo-Distances in Document Categorization,<strong><u>Auteurs :<\/u><\/strong> Said G., Abdelouahab M<\/td><\/tr><tr><td width=\"579\">Neural Network World NNW ((ISI Thomson, IF: 0.2, Czech Republic), accepted for publication.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>14- <\/strong><\/td><td width=\"579\"><em>On the Action of the symmetric group on error-correcting codes, Applied Sciences, Vol.18, 2016, pp. 60-65,<\/em> <em>Balkan Society of Geometers, Geometry Balkan Press 2016.<\/em><strong><u>Auteurs :<\/u><\/strong> <strong>Ladjelat lahcene.<\/strong><\/td><\/tr><tr><td width=\"579\">http:\/\/vectron.mathem.pub.ro\/apps\/v18\/A18.html<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>15- <\/strong><\/td><td width=\"579\"><em>On the Lipschitz \u03c4(p)-summing operators<\/em>. <strong>Colloq. Math.<\/strong> To appear.<strong><u>Auteurs :<\/u><\/strong> <strong>L. MEZRAG, A. TALLAB<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/https:\/\/www.impan.pl\/pl\/wydawnictwa\/czasopisma-i-serie-wydawnicze\/colloquium-mathematicum\" target=\"_blank\" rel=\"noopener\">https:\/\/www.impan.pl\/pl\/wydawnictwa\/czasopisma-i-serie-wydawnicze\/colloquium-mathematicum<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>16- <\/strong><\/td><td width=\"579\">\u00bb A new class of Isodual Cyclic Codes of rate \u00bd over Fp \u00ab , <em>Romanian Journal of Mathematics and Computer Sciences, <\/em>(2016), 1: 1-5.<strong><u>Auteurs :<\/u><\/strong> C. Mihoubi and P. Sol\u00e9<\/td><\/tr><tr><td width=\"579\">http:\/\/www.rjm-cs.ro<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>17- <\/strong><\/td><td width=\"579\">A Construction of Some Group Codes,.<strong><u>Auteurs :<\/u><\/strong> Nacer ghadbane, Mihoubi Douadi<\/td><\/tr><tr><td width=\"579\">I. J. of Electronics and Information Engineering, Vol.4, No.2, PP.55-59, June 2016<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>18- <\/strong><\/td><td width=\"579\">Proof by induction of the strong Goldbach\u2019s conjecture.<strong><u>Auteurs :<\/u><\/strong> Mihoubi Douadi.<\/td><\/tr><tr><td width=\"579\">https:\/\/hal.archives-ouvertes.fr\/hal-01251852v2.<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>19- <\/strong><\/td><td width=\"579\"><em>Characterizations of intuitionistic fuzzy complete lattices<\/em>, <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.springer.com\/us\/book\/9783319262109\" target=\"_blank\" rel=\"noopener\"><strong>Novel Developments in Uncertainty Representation and Processing<\/strong><\/a><strong> Advances in Intelligent Systems and Computing, Springer International Publishing Switzerland<\/strong>. 401, 149-160 (2016).<strong><u>Auteurs :<\/u><\/strong> <strong>S. Milles, E. Rak and L. Zedam<\/strong><\/td><\/tr><tr><td width=\"579\">http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-26211-6_13<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>20- <\/strong><\/td><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.rairo-ro.org\/articles\/ro\/abs\/2016\/01\/ro150013\/ro150013.html\" target=\"_blank\" rel=\"noopener\"><em>Metaheuristics to solve a tasks scheduling problem in parallel identical machines with unavailability periods<\/em><\/a><em>.<\/em><strong><u>Auteurs :<\/u><\/strong> <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.rairo-ro.org\/component\/solr\/\" target=\"_blank\" rel=\"noopener\">Rachid zitouni<\/a> and <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.rairo-ro.org\/component\/solr\/\" target=\"_blank\" rel=\"noopener\">Omar selt<\/a>.<\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.rairo\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.rairo<\/a> ro.org\/component\/solr\/?task=results#!q=selt%20omar&amp;sort=score%20desc&amp;rows=10&amp;e=ro<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>21- <\/strong><\/td><td width=\"579\"><p>A comparative study between two approaches for scheduling on single Machine<\/p><p>International Arab Conference on Mathematics and Computations (2016), Zarqa University, Jordan<\/p><p><strong><u>Auteurs :<\/u><\/strong> <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.rairo-ro.org\/component\/solr\/\" target=\"_blank\" rel=\"noopener\">Omar selt<\/a>.<\/p><\/td><\/tr><tr><td width=\"579\">http:\/\/www.ask.com\/web?q=comparative+study+between+two+approaches+omar+selt&amp;qsrc=1&amp;o=0&amp;l=dir&amp;qo=serpSearchTopBox<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>22- <\/strong><\/td><td width=\"579\">A clone-based representation of the fuzzy tolerance or equivalence relations a strict order relation is compatible with. <strong>Fuzzy set and systems. <\/strong><strong>296, 35-50 (2016).<\/strong><strong><u>Auteurs :<\/u><\/strong> <strong>B. De Baets, Lemnaouar Zedam and A. Kheniche. <\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0165011415004455\" target=\"_blank\" rel=\"noopener\">http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0165011415004455<\/a><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/dx.doi.org\/10.1016\/j.fss.2015.09.015\" target=\"_blank\" rel=\"noopener\">doi:10.1016\/j.fss.2015.09.015<\/a><\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>23- <\/strong><\/td><td width=\"579\">Compatibility of fuzzy relations . <strong>International Journal of Intelligent Systems.<\/strong> <strong>31 (3), 240-256 (2016).<\/strong><strong><u>Auteurs :<\/u><\/strong> <strong>B. De Baets, A. Kheniche and Lemnaouar Zedam<\/strong><\/td><\/tr><tr><td width=\"579\">http:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.21783\/abstract<\/td><\/tr><tr><td rowspan=\"2\" width=\"79\"><strong>2016<\/strong><\/td><td rowspan=\"2\" width=\"54\"><strong>24- <\/strong><\/td><td width=\"579\">Many-Valued Logic and Zadeh\u2019s Fuzzy Sets: A Stone Representation Theorem for Interval Valued \u0141ukasiewicz\u2013Moisil Algebras. <strong> Journal of Intelligent systems, 25 (2), 96-106 (2016).<\/strong><strong><u>Auteurs :<\/u><\/strong> <strong>A . Amroune , Lemnaouar Zedam and B. Davvaz.<\/strong><\/td><\/tr><tr><td width=\"579\"><a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/www.degruyter.com\/view\/j\/jisys.2016.25.issue-2\/jisys-2014-0096\/jisys-2014-0096.xml?format=INT\" target=\"_blank\" rel=\"noopener\">http:\/\/www.degruyter.com\/view\/j\/jisys.2016.25.issue-2\/jisys-2014-0096\/jisys-2014-0096.xml?format=INT<\/a> (DOI: <a href=\"https:\/\/web.archive.org\/web\/20190409044025\/http:\/\/dx.doi.org\/10.1515\/jisys-2014-0096\" target=\"_blank\" rel=\"noopener\">10.1515\/jisys-2014-0096<\/a>,)<\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u0627\u0644\u0625\u0646\u062a\u0627\u062c \u0627\u0644\u0639\u0644\u0645\u064a \u0644\u0623\u0633\u0627\u062a\u0630\u0629 \u0643\u0644\u064a\u0629 \u0627\u0644\u0631\u064a\u0627\u0636\u064a\u0627\u062a \u0648\u0627\u0644\u0625\u0639\u0644\u0627\u0645 \u0627\u0644\u0622\u0644\u064a \u0644\u0633\u0646\u0629 2014 \u0639\u062f\u062f \u0627\u0644\u0623\u0648\u0631\u0627\u0642 \u0627\u0644\u0639\u0644\u0645\u064a\u0629(\u0645\u0646\u0634\u0648\u0631\u0627\u062a) : 16 \u0627\u0644\u0639\u0627\u0645 \u0627\u0644\u0631\u0642\u0645 \u0627\u0644\u0648\u0631\u0642\u0629\u060c \u0627\u0644\u0645\u0624\u0644\u0641 \u060c \u0627\u0644\u0645\u0631\u062c\u0639 2014 1- Domination and factorization theorems for positive strongly p-summing operators. Positivity, 18, 4 (2014) 785-804.Auteurs : D. Achour , &hellip; <\/p>\n","protected":false},"author":10,"featured_media":0,"parent":24069,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_lmt_disableupdate":"","_lmt_disable":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-25650","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/pages\/25650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/comments?post=25650"}],"version-history":[{"count":31,"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/pages\/25650\/revisions"}],"predecessor-version":[{"id":49980,"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/pages\/25650\/revisions\/49980"}],"up":[{"embeddable":true,"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/pages\/24069"}],"wp:attachment":[{"href":"https:\/\/www.univ-msila.dz\/site\/wp-json\/wp\/v2\/media?parent=25650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}