Institutional Repository

FACULTY OF NATURAL & APPLIED SCIENCES

FACULTY OF NATURAL & APPLIED SCIENCES

Recent Submissions

  • Zgheib, Ghewa (Notre Dame University-Louaize, 2024-06)
    In the realm of mathematics, the evaluation of integrals plays a crucial role in various fields such as physics, engineering, and economics. Integrals represent the accumulation of quantities over a continuous range and are essential for understanding the behavior of functions and solving complex problems. Over the years, mathematicians and researchers have developed numerous techniques to evaluate integrals efficiently and accurately. This thesis consists of two parts. In the first part, we present some binomial identities, special numbers and polynomials as well as basic formulas related to ...
  • Jradi, Samah (Notre Dame University-Louaize, 2015-08)
    In this paper, we'll examine the effect of Cauchy errors in a linear model on the performance of the least squares and maximum likelihood estimators with the aid of two factors; the sample size and the Cauchy scale parameter. A sampling distribution of one hundred experiments was done to judge the estimation process in the case of least squares method. On the other hand, multivariate Newton Raphson was used to calculate the unique solution of the partial derivatives of the log lokelihood function. The uniqueness of the solution is proved for a known location parameter and unknown scale parameter. ...
  • Atallah, Jennifer (Notre Dame University-Louaize, 2015-02-04)
    The paper presents the study of the iterations of rational fractions, that is, the behavior of z_0,z_1=f(z_0 ),…,z_(n+1)=f(z_n ),… We illustrate the conditions needed for this function to behave as its linear part and prove the existence of Siegel and Cremer points. The study extends to a description of Fatou and Julia sets.
  • Chaaya, Georges (Notre Dame University-Louaize, 2015-06)
    Anomaly detection is the process of finding outlying record from a given data set. This problem has been of increasing importance due to the increase in the size of the data and the need to efficiently extract those outlying records that can have important indications in real-life problems. Anomaly detection is applied in many different sectors. There are many approaches to solve the anomaly detection problem. However, those that are more widely applicable are unsupervised approaches as they do not require labeled data. The aim of this thesis is to study a well-known anomaly detection technique ...
  • Azzi, Dany; El Hajj, Maya (Axiom Academic Publishers, 2023)
    Considering the recent paradigm shift in education brought about by the Covid-19 pandemic, educational institutions have shifted to optimizing the use of technology for distance teaching and learning. This shift has propelled educational institutions worldwide to experiment with innovative teaching and learning methods—a de facto measure employed to ensure educational continuation previously disrupted by pandemic-related closures. Lebanon is not an atypical case; in addition to the pandemic, closures have been inflicted on the education sector by the events of October 17, 2019, and the ...
  • Baroud, Fawzi; Abouchedid, Kamal (Axiom Academic Publishers, 2023)
    This chapter discusses the processes and outcomes of utilizing Open Educational Resources (OER) in Lebanon for addressing five challenges that represent barriers to incorporating 21st Century Competencies (21st CC) and aspects of the Sustainable Development Goals 2030 (SDGs) in the curriculum. It draws on the experience of the UNESCO-OER Chair for Access and Success housed at Notre Dame University-Louaize (NDU). The work promoting Open Pedagogy (OP) enabled OER in Lebanon a priori. The OER activities set to address Lebanon’s educational problems are aligned with the Recommendation on OER ...
  • Azar, Marie-Reine (Notre Dame University-Louaize, 2014-01-15)
    The origin of mathematical matrices lies with the study of systems of simultaneous linear equations. Today, they are used not simply for solving systems of simultaneous linear equations, but also for describing the quantum mechanics of atomic structure, and even for designing computer game graphics. Matrices are very useful due to the fact that they can be easily manipulated. We use the notation A-1 to denote the inverse of a matrix A. One of the major uses of inverses is to solve a system of linear equations. You can write a system in matrix form as AX=B, then X=A-1B. Inverses are also used in ...
  • Saliba, Elisabeth (Notre Dame University-Louaize, 2020-12)
    Prostate cancer (PCa) is the most frequent cancer malignancy among men and the third leading cause of cancer death in the developed world. To date, the exact molecular mechanism underlying the role of caffeine one of the major coffee constituents on PCa prognosis is not yet unraveled. Caffeine has many antioxidant, anti-inflammatory and anti carcinogenic properties through the modulation of certain inflammatory markers such as IL-6 and TNF-α. The present study was carried out to evaluate the effect of caffeine on PCa cell lines viability, namely PC3 and PC3-PSMA and assessing as well their ...
  • Abou Ali, Maya (Notre Dame University-Louaize, 2015-01-20)
    The purpose of this dissertation is to study pseudo-Riemannian algebras, which are algebras with pseudo-Riemannian non-degenerate symmetric bilinear forms. The paper([1]), the authors Zhiqi Chen, Ke Liang, and Fuhai Zhu find that pseudo-Riemannian algebras whose left centers are isotropic play a key role and show that the decomposition of pseudo-Riemannian algebras whose left centers are isotropic into indecomposable non-degenerate ideals is unique up to a special automorphism. Furthermore, if the left center equals the center, the orthogonal decomposition of any pseudo-Riemannian algebra into ...
  • El-Jerdy, Firas François (Notre Dame University-Louaize, 2022-07)
    Quantum key distribution uses special purpose hardware and quantum mechanics to distribute cryptographic keys in a system for its usage in a classical symmetric key scheme for encryption and decryption. There are two appeals for going to such length of creating special hardware and utilizing quantum mechanics to distribute keys over parties. First, detecting eavesdropping on communication due to the fundamental properties of photons governed by quantum mechanics. Second, offering a solution to the byproduct effect of quantum computers breaking the most common asymmetric schemes (Transport Layer ...
  • Chelala, Maria Ghosn (Notre Dame University-Louaize, 2006)
    With the current rising trend in wireless based systems, applications such as video on demand, remote monitoring and surveillance are now being used in greater abundance. Coupled with this growth comes the ongoing need for improved network performance. This is due to the resource hungry nature of video data which places stringent requirements on communication networks. This study investigates performance improvement for remote surveillance applications over hybrid 2-stage disordering networks. It specifically focuses on resequencing alternatives for video data. A resequencing and batch aggregation ...
  • Saliba, Charbel (Notre Dame University-Louaize, 2022-07)
    This research aims to validate the viability of implementing NFT mechanics in a video game. It discusses the blockchain technology’s limitations, as well as the many restrictions that NFT forces on game developers. Be it their immutable nature, their high minting cost, or their incapacity of holding big data. It also highlights the restrictions that prevent the interoperability of game assets, and finally, the ludicrous Play-to-earn business model. Two games are also developed, Crypto Forgers and Crypto Run, to further validate the findings presented by this research. While these two games are ...
  • Kahwagi, Roger (Notre Dame University-Louaize, 2007)
    This thesis examines the different type of agents, and how they help evolve the world around, most particularly the way business are undertaken and handled. The following work is based upon the DALIA environment, which stands for Distributed Autonomous and Linguistically Competent Agents. In this work I have extended and improved the DALIA agent negotiation aspect, where two agents are involved in an offer and counter-offer negotiations. The model presented by DALIA for the offers and counter offers ia investigated and the weak points in the negotiation paradigm are identified. A strategy is ...
  • Al Hassanieh, Joelle (Notre Dame University-Louaize, 2022)
    Humans are exposed to a notable variety of toxicants including lead as a heavy metal resulting from occupations and through environmental accumulation as in the Lebanese coastal and freshwaters. It is well established that lead exposure in the workplace contributes to worker infertility and decreased reproductive efficiency. Several reports have reported the detrimental impact toxic effects on human male reproduction by subsiding libido, spermatogenesis, semen quality, hormonal production and regulation, and much more. The objectives of this study were to inspect the effects of ...
  • Chmeit, Nader (Notre Dame University-Louaize, 2012-07)
    The scheduling problem is one of the most challenging problems faced in many different areas of everyday life. This problem can be formulated as a combinatorial optimization problem, and it has been solved with various methods using heuristics and intelligent algorithms. We present in this research an efficient solution to the scheduling problem using two different heuristics namely Simulated Annealing and Ant Colony Optimization. A study comparing the performances of both solutions is described and the results are analyzed.
  • Ezzeddine, Rana (Notre Dame University-Louaize, 2012-09)
    It is important to understand stellar evolution as well as the chemical composition and structure of the Galactic disk, in which B stars in open clusters play a major role as they are of the most massive and brightest objects in these clusters. The fundamental atmospheric parameters (Teff, log g) of the B stars in the Alpha Persei open cluster (190pc, 50Myrs) have been determined using the Stromgren uvby-β photometric system, with a calibration technique by Napiwotzki et al. (1993)[65]. The method is based on fitting spectral lines of fundamental stars to synthetic spectra based on Kurucz ...
  • Hajje, Thilda (Notre Dame University-Louaize, 2022)
    Vaccination is a preventive measure to reduce death and morbidity against infectious diseases, and has been applied effectively against most of the viral and bacterial infections around the world. Targeted campaigns against children diseases have been very effective in drastically reducing such diseases thanks to national immunization programs in both developed and developing countries. However, many individuals including parents of various ages are still reluctant to commit to vaccination and some recent fears have been increasing when it comes to vaccination more recently, especially due to ...
  • Sfeir, Elias (Notre Dame University-Louaize, 2012)
    Delay-Tolerant Networks (DTNs) are a type of emerging networks characterized by very long delay paths, frequent network partitions and high loss rates. The nodes are sparsely deployed and intermittently connected. The presenting network is used in a variety of environments including military, disaster situations and for long distance communications. Although it is used in critical sectors, the communication support lacks the high end technology usually found in important networks. The nodes participating in this network do not have stable end-to-end connections. They can communicate to each other ...
  • Simonian, Roy (Notre Dame University-Louaize, 2022)
    The world is witnessing nowadays a virus that spreads in a very fast manner and it has infected a large number of people. Countries rushed to find ways to stop this virus from spreading and to minimize the risks of getting infected. One of these ways was to integrate technology in people’s daily routine to help in containing the virus. In fact, although several countries took a lot of legal measurements and law enforcement to prevent the spread of the virus, such as wearing facial masks, social distancing, using sanitizers and other forms of hygiene supplements, there were always the need to ...
  • Saliba, Elie Fayez (Notre Dame University-Louaize, 2015-07-09)
    In this work we discuss a special kind of stochastic processesX=〖{X_t}〗_(〖t∈R〗_(≥0) ) that are of exceptional interest from both the theoretical ad the applied points of view. These processes are called Affine Processes, and are characterized by the fact that their characteristic function has the form of an exponential of an affine function, i.e. by 〖∅^x〗_X (u) |_t=E^x [e^(<X_(t ),u>) ]=e^(Φ(t,u)+<x,Ψ(t,u)>), Where the exponent Φ(t,u)+ <x,Ψ(t,u)> Is an affine function of its initial state x in the state-space E=〖R^m〗_(≥0)×R^n. The above expectation E^x is the expectation which respect to the ...

View more