Institutional Repository

Browsing by Author "Maalouf, Hoda, Ph.D."

Browsing by Author "Maalouf, Hoda, Ph.D."

Sort by: Order: Results:

  • Chaaya, Georges (Notre Dame University-Louaize, 2015-06)
    Anomaly detection is the process of finding outlying record from a given data set. This problem has been of increasing importance due to the increase in the size of the data and the need to efficiently extract those outlying records that can have important indications in real-life problems. Anomaly detection is applied in many different sectors. There are many approaches to solve the anomaly detection problem. However, those that are more widely applicable are unsupervised approaches as they do not require labeled data. The aim of this thesis is to study a well-known anomaly detection technique ...
  • Akiki, Pierre (Notre Dame University-Louaize, 2007)
    The term spatial data signifies all geometric objects of different dimensions and the relations that could bind these objects together. Spatial data is, in general, divided into two parts: crisp spatial data and vague spatial data. Crisp spatial data has determinate coordinates and boundaries, whereas vague spatial data has indeterminate ones. The demand for spatial data support in database management systems is growing every day, yet not all commercial products provide spatial data support natively, and those that do merely provide it partially. Since database management systems are at the heart ...
  • El Haddad, Anthony (Notre Dame University-Louaize, 2022-07)
    With the considerable rise of Internet users and the massive and diverse web searches, an excess of data has become available online. A recommendation model, also known as an engine, handles this massive amount of data available to find patterns that reflect user behaviors. Recommendation models have been implemented in several industries, and the most popular implementation is in the entertainment industry, specifically video streaming and on-demand platforms. There are several types of recommendation systems. In this paper, we have proposed a way to escape the loop created by the recommendation ...
  • Kamouh, Walid A. (Notre Dame University-Louaize., 2000-07)
    The internet is once again suffering from its own success. Since 1995, there has been a massive increase in demand for internet services, resulting in an exponential growth of the Internet. We have entered now an era where the users of the Internet are unable to obtain the bandwidth needed to support their applications, and they are experiencing high packet loss. Packet loss problem arises whenever the number of packets arriving at a given router is much higher than its buffering space. The main goal of this thesis is to find adaptive schemes capable of optimizing the communication network ...
  • Azzi, Ziad (Notre Dame University-Louaize, 2005)
    Wireless sensor networking is an increasingly important technology that is used in a variety of applications, such as environmental monitoring, infrastructure management, public safety, medical, home and office security, transportation and military systems. However, until now, wireless sensor networks (WSNs) and their applications have been developed without considering an integrated management solution. This thesis analyzes in detail emerging wireless sensor management schemes and proposes a hybrid network model that establishes a combination between event-driven and continuous WSNs. The main ...
  • Saliba, Charbel (Notre Dame University-Louaize, 2022-07)
    This research aims to validate the viability of implementing NFT mechanics in a video game. It discusses the blockchain technology’s limitations, as well as the many restrictions that NFT forces on game developers. Be it their immutable nature, their high minting cost, or their incapacity of holding big data. It also highlights the restrictions that prevent the interoperability of game assets, and finally, the ludicrous Play-to-earn business model. Two games are also developed, Crypto Forgers and Crypto Run, to further validate the findings presented by this research. While these two games are ...
  • Semaan, Georgio (Notre Dame University-Louaize, 2021-05)
    In recent times, a new technology – Blockchain was brought forward to the global society. The world is using the term ‘Blockchain technology’ to signify diverse things such as the Bitcoin Blockchain, virtual currencies like Cardano and XRP, and smart contracts. Blockchain-based applications are springing up, covering several fields comprising financial services, reputation system and Internet of Things (IoT), and so on. Generally, Blockchain is implicit to be distributed ledgers that is a list of transactions verified and stored into blocks and shared among a number of computer nodes in a ...
  • Khalil, Fadi Y. (Notre Dame University-Louaize, 2018)
    With the advancement in computing and wireless technologies, the world has witnessed a growing number of connected devices to the Internet at an unpretending rate. Fog computing emerges as an alternative solution to reduce the burden of Data Centers in traditional Cloud Computing and to support geographically distributed, latency sensitive, and QoS-aware IoT appliations. Fog Computing suggests, that the intelligence should move from the data centers to the edge of network. The main objective of this thesis is to determine the significance and feasibility of implementing a broker node between ...
  • Chelala, Maria Ghosn (Notre Dame University-Louaize, 2006)
    With the current rising trend in wireless based systems, applications such as video on demand, remote monitoring and surveillance are now being used in greater abundance. Coupled with this growth comes the ongoing need for improved network performance. This is due to the resource hungry nature of video data which places stringent requirements on communication networks. This study investigates performance improvement for remote surveillance applications over hybrid 2-stage disordering networks. It specifically focuses on resequencing alternatives for video data. A resequencing and batch aggregation ...
  • Sfeir, Elias (Notre Dame University-Louaize, 2012)
    Delay-Tolerant Networks (DTNs) are a type of emerging networks characterized by very long delay paths, frequent network partitions and high loss rates. The nodes are sparsely deployed and intermittently connected. The presenting network is used in a variety of environments including military, disaster situations and for long distance communications. Although it is used in critical sectors, the communication support lacks the high end technology usually found in important networks. The nodes participating in this network do not have stable end-to-end connections. They can communicate to each other ...
  • Azar, Edgard (Notre Dame University-Louaize, 2004)
    The emerging field of wireless sensor networks combines sensing, computation, and communication into a single tiny device. Through advanced mesh networking protocols, these devices form a sea of connectivity that uses any possible communication path by hopping data from one node to another in search of its destination. While the capabilities of any single device are minimal, the collection of hundreds of sensors offers major new technological possibilities. Examples of usage scenarios for these devices are real-time tracking and security monitoring, issues that will be studied in this thesis. ...
  • El Khoury Badran, Miriam (Notre Dame University-Louaize, 2019-05)
    With the rise of the Internet, recommender systems are becoming a used solution to solve the information overload problem. These systems are like any other system, subject to noise: malicious noise that is caused by attacks and natural noise that is due to the human error. Many detection algorithms solve the noise problem. However, since natural noise and serendipity overlap in their definition, removing noise results in removing serendipity. Serendipity that is the happy surprise of finding something relevant unexpectedly is important for the issue of over personalization caused by the recommender ...
  • Simonian, Roy (Notre Dame University-Louaize, 2022)
    The world is witnessing nowadays a virus that spreads in a very fast manner and it has infected a large number of people. Countries rushed to find ways to stop this virus from spreading and to minimize the risks of getting infected. One of these ways was to integrate technology in people’s daily routine to help in containing the virus. In fact, although several countries took a lot of legal measurements and law enforcement to prevent the spread of the virus, such as wearing facial masks, social distancing, using sanitizers and other forms of hygiene supplements, there were always the need to ...