RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCOPUSKCI등재

        Multivariable Recursively Generated Weighted Shifts and the 2-variable Subnormal Completion Problem

        Idrissi, Kaissar,Zerouali, El Hassan Department of Mathematics 2018 Kyungpook mathematical journal Vol.58 No.4

        In this paper, we give a new approach to solving the 2-variable subnormal completion problem (SCP for short). To this aim, we extend the notion of recursively generated weighted shifts, introduced by R. Curto and L. Fialkow, to 2-variable case. We next provide "concrete" necessary and sufficient conditions for the existence of solutions to the 2-variable SCP with minimal Berger measure. Furthermore, a short alternative proof to the propagation phenomena, for the subnormal weighted shifts in 2-variable, is given.

      • KCI등재

        Study of the solar perovskites: XZnF3 (X = Ag, Li or Na) by DFT and TDDFT methods

        Idrissi S.,Mounkachi O.,Bahmad L.,Benyoussef A. 한국세라믹학회 2023 한국세라믹학회지 Vol.60 No.2

        In this work, we have applied the density functional theory (DFT) and time-dependent density-functional theory (TDDFT) to study and discuss the different properties of the inorganic perovskites XZnF3 (X = Ag, Li or Na). In fact, we have presented the structural, electronic and optical properties of the Halide Perovskite XZnF3 (X = Ag, Li or Na). Such materials are in great demand for solar cell uses. To conduct this study, we have applied the Quantum Espresso package using the two methods: GGA–PBE and GGA–PBESol. The different lattice parameter a (Å) values have been used to deduce the energy optimum of the perovskites XZnF3 (X = Ag, Li or Na). Besides, the total and partial density of states (DOS) and the band structure of these materials have been illustrated for the two situations: in the presence and the absence of the Spin Orbit Coupling (SOC) approximation. To complete this study, we have presented the optical properties of the XZnF3 (X = Ag, Li or Na) materials. In fact, such properties have been investigated when exploring the real and imaginary parts of the corresponding dielectric function. To reach this goal, we have applied the two approximations: the GGA–PBE and GGA–PBESOL. Our results reveal high transparency of the electromagnetic radiations in the energy range between (0.0 ħω) Ry and (0.25 ħω) Ry. A notable peak of the imaginary part, has been found at about (0.15 ħω) Ry for the studied materials, confirms the transition from the top of valence band to the bottom of conduction band.

      • KCI등재

        New Delay Dependent Robust Stability Criteria for T–S Fuzzy Systems with Constant Delay

        Said Idrissi,El Houssaine Tissir,Ismail Boumhidi,Noreddine Chaibi 제어·로봇·시스템학회 2013 International Journal of Control, Automation, and Vol.11 No.5

        This paper deals with the problem of delay dependent robust stability for T–S fuzzy time delay systems. The approach based on constructing a new Lyapunov-Krasovskii functional by dividing uniformly the delay interval into N segment with N is positive integer, and using Finsler’s lemma. This new Lyapunov-Krasovskii functional is chosen with different weighted matrices corresponding to dif-ferent segments. The perturbations considered are norm bounded, and the results are expressed in terms of linear matrix inequality (LMIs). Numerical examples are provided to show the effectiveness of the present method, compared with some recent previous ones.

      • Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization

        Hind Idrissi,El Mamoun Souidi,Arnaud Revel 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.5

        Recent days, the systems based on mobile agents have attracted the attention of many researchers in different areas, because of the autonomic and pro-active aspects of the agent, as well as its adaptive and dynamic behaviors in solving complex problems. However, the mobility of these entities needs to be secured against multiple vulnerabilities that present a real obstacle to its wide expansion. When the mobile agent is migrating from one node to another over the network, it is difficult to guarantee that it will be executed safely and correctly on the hosting platform, neither that it will not encounter in its way malicious entities that try to harm it. In this paper, we try to address these security issues by introducing an approach based on cryptographic mechanisms. This approach involves an Identity-Based Key Agreement Protocol to get a session key and ensure authentication, an Advanced Standard Encryption (AES) for the confidentiality of data exchanged, as well as a Binary Serialization to get an easy and persistent portability of the agent across the network.

      • Security of Mobile Agent Platforms using RBAC based on Dynamic Role Assignment

        Hind IDRISSI,Arnaud REVEL,El Mamoun SOUIDI 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4

        Mobile agent technology is a new trend in the network computing. It succeeds to capture researchers' and industry's interests long time ago, due to its innovative capabilities and attractive applications. Mobile agents are self-contained data and software modules, able to autonomously move from one host to another across the network, in order to perform their tasks and eventually return to their initiators. Despite their several qualities that make them suitable for various disciplines, where autonomy, dynamism and flexibility are strongly recommended, mobile agents still suffer from some limitations mainly related to the security issues raised by mobility. In this paper, we propose a novel approach to address the security problems evoked by platforms hosting mobile agents, particularly those caused by unauthorized access attacks. Our approach introduces a robust security policy for a Hospital, where a flexible role-based access control model (RBAC) is used and simulated as a set of cooperative agents. We implant a privilege management infrastructure (PMI) charged with issuing attribute certificates based on elliptic curve cryptography, in order to provide this model with a dynamic role assignment. Finally, practical experiments are conducted to evaluate our approach and prove its effectiveness, reliability and security.

      • KCI등재

        IL-1 and CD40/CD40L platelet complex: elements of induction of Crohn’s disease and new therapeutic targets

        Doha Anka Idrissi,Nezha Senhaji,Asmae Aouiss,Loubna Khalki,Youssef Tijani,Nabil Zaid,Fatima Zahra Marhoume,Abdallah Naya,Mounia Oudghiri,Mostafa Kabine,Younes Zaid 대한약학회 2021 Archives of Pharmacal Research Vol.44 No.1

        Ulcerative colitis (UC) and Crohn’s disease (CD)are chronic and multifactorial diseases that affect the intestinaltract, both characterized by recurrent inflammation ofthe intestinal mucosa, resulting in abdominal pain, diarrhea,vomiting and, rectal bleeding. Inflammatory bowel diseases(IBD) regroup these two disorders. The exact pathologicalmechanism of IBD remains ambiguous and poorly known. In genetically predisposed patients, defects in intestinalmucosal barrier are due to an uncontrolled inflammatoryresponse to normal flora. In addition to the genetic predisposition,these defects could be triggered by environmentalfactors or by a specific lifestyle which is widely accepted asetiological hypothesis. The involvement of the CD40/CD40Lplatelet complex in the development of IBD has been overwhelminglydemonstrated. CD40L is climacteric in cell signallingin innate and adaptive immunity, the CD40L expressionon the platelet cell surface gives them an immunologicalcompetence. The IL-1, a major inflammation mediator could be involved in different ways in the development of IBD. Here, we provide a comprehensive review regarding therole of platelet CD40/CD40L in the pathophysiologicaleffect of IL-1 in the development of Crohn’s disease (CD). This review could potentially help future approaches aimingto target these two pathways for therapeutic purposesand elucidate the immunological mechanisms driving gutinflammation.

      • KCI등재

        Game Theory Approach for Energy Consumption Scheduling of a Community of Smart Grids

        Naji El Idrissi Rajaa,Ouassaid Mohammed,Maaroufi Mohamed 대한전기학회 2023 Journal of Electrical Engineering & Technology Vol.18 No.4

        This study analyzes the potential of an independent method of dynamic pricing schemes to reduce the peak demand in the neighborhood area. For this, this work develops a collective energy consumption scheduling (CECS) algorithm in the residential sector based on a combination of energy consumption plans under a bi-level game theory method. The local level is responsible of gathering internal users’ data and reducing the energy consumption in each residential building. The central level is the external demand management system that is focused on modeling a coalition between the local load management modules, as well as giving the redistributed demand profile to increase the global profit through a peak load minimization, financial gain and peak-to-average-ratio reduction. Four controllable appliances are included in load shifting and time activation cycling: clothes dryer units, heating, ventilation and air conditioning systems, electric water heater, and electric vehicle. The principle of the proposed CECS method relies on the flexibility of the user requirement that presents one of the contributions of this study. It proposes a novel framework for determining optimal non-static load management strategies, in which consumers can change their daily power demand patterns depending on their routines, preferences and requirements. Numerical results show that time-varying schemes encourage customers to condense their electricity consumption within low-price periods. However, by incorporating the proposed approach of coordinated scheduling algorithm significant profits in the whole and single level are demonstrated. Simulations infer that given the same load profiles, the proposed framework outperforms the non-coordinated strategy leading to important rates in total peak load minimization, total saving in electricity bills and reduction of peak-to-average-ratio.

      • KCI등재

        Modelling of Progressive Damage in a Notched Carbon/Epoxy Composite Laminate Subjected to Tensile Loading Using Different Assessment Methods Coupled with FEM

        Hamza El Idrissi,Abbass Seddouki 한국섬유공학회 2022 Fibers and polymers Vol.23 No.11

        Modelling of progressive damage in a notched carbon/epoxy composite laminate subjected to tensile loading usingdifferent assessment methods coupled with FEM. In this study, various evaluation methods for the initial and progressivefailure of composite laminated have been proposed and assessed based on several failure criteria (Puck and Hashin) andcoupled with damage mechanics (gradual degradation methods and continuum damage mechanic), respectively. This workaims to model the behaviour and the damage phenomenon in T300/1034C carbon/epoxy composite laminates under tensileloading while considering the effect of different stacking sequences and stress concentration. Hence, a user-definedsubroutine Material (UMAT) has been successfully implemented, using finite element software Abaqus, through couplingPuck’s failure criteria and gradual degradation methods (Constant stress exposure and Element weakening method) to enableaccessible use of failure analysis. However, the analysis results comprise the prediction of the failure load, failure modes andload vs displacement curves which were compared to the experimental/numerical findings already provided in the literatureas well as the study of the mesh dependency for the applied methods. This comparative study confirmed that the PUCK+CSEmodel has the potential not only to give a thorough understanding of progressive failure mechanisms in fibre-reinforcedcomposites, but can also be used to design composite laminates involving holes and notches, where the simulation results arewithin the confidence interval.

      • SCOPUSKCI등재

        RELATIONSHIP BETWEEN THE STRUCTURE OF A QUOTIENT RING AND THE BEHAVIOR OF CERTAIN ADDITIVE MAPPINGS

        Bouchannafa, Karim,Idrissi, Moulay Abdallah,Oukhtite, Lahcen Korean Mathematical Society 2022 대한수학회논문집 Vol.37 No.2

        The principal aim of this paper is to study the connection between the structure of a quotient ring R/P and the behavior of special additive mappings of R. More precisely, we characterize the commutativity of R/P using derivations (generalized derivations) of R satisfying algebraic identities involving the prime ideal P. Furthermore, we provide examples to show that the various restrictions imposed in the hypothesis of our theorems are not superfluous.

      • SCOPUS

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼