Institutional Repository

Browsing FACULTY OF NATURAL & APPLIED SCIENCES by Issue Date

Browsing FACULTY OF NATURAL & APPLIED SCIENCES by Issue Date

Sort by: Order: Results:

  • Mouawad, Maurice T. (Notre Dame University-Louaize, 2001-06)
    The web is a vast source of information. However, due to the divisiveness and unlikeness of web pages' contents, this information is covered in the chaotic structure of the World Wide Web. At the same time, with the spread of web access, search engines are being, if not the sole utility, one of the most mechanisms used by the increasing number of users, to find interesting information. We are interested in identifying how pieces of information represented by URL pages, sharing common topics, are related as they are represented on the web. One such problem is studying patterns of occurrences of ...
  • Mansour, Emile N. (Notre Dame University-Louaize, 2002)
    Mobility attracts many developers and system designers; it will give us the ability to use our computers with no physical limitations with respect to connections. This thesis will try to introduce the main concepts that define mobile computing in our days. It will identify the challenges that face mobile computing and their impact on current developments in this area. Location management and how the cellular networks function is defined and described. We will conduct a comparison between protocols in location management with respect to network messages and database operations. In the IS-41 model ...
  • Aad, Elie (Notre Dame University-Louaize, 2002)
    Mining association rules has been an important topic in data mining research in recent years from the standpoint of supporting human-centered discovery of knowledge. The present day model of mining association rules suffers from the following shortcomings: (i) lack of user exploration and control, (ii) lack of focus, (iii) huge number of rules technically unreadable. All data mining researchers, have given a high importance on developing fast algorithms for rules discovery, and have applied different types of constraints in different algorithms to prune item sets, that do not occur frequently ...
  • Karam, Rita (Notre Dame University-Louaize, 2002)
    This thesis discusses Artificial Economy with applications to Reinforcement Learning. It focuses first on Reinforcement Learning, comparing it to other types of learning such as Supervised Learning. It then covers a historical overview of the field and summarizes the current works. The work described in this thesis has a psychological approach as we focus on reward and punishment. We experiment Artificial Economy with a prototype which solves the Blocks World problem. We then show how the Artificial Economy approach can be integrated with other concepts of Reinforcement Learning techniques.
  • Jurascovitch, Elie M. (Notre Dame University-Louaize, 2002)
    The purpose of this thesis is to study distributed applications in the context of heterogeneous clients (Web browser, mobile) and business-to-business (B2B) integration. Two distributed architectures, leaders of the distributed applications market are presented and compared: Microsoft's .NET, and Sun's Java Enterprise Java Beans (J2EE). After this comparative study, we chose .NET to develop an e- commerce application (Jurasco Style electronic shop) in order to outline the major application architectural issues and solutions offered by .NET technology. Our study also shows how the .NET Jurasco ...
  • Akl, Imad M. (Notre Dame University-Louaize, 2002-06)
    This thesis uses the HITS algorithm as a basis to propose an interactive internet search engine. With the Web becoming a major source of information for many users, it became a necessity to be able to search the Web efficiently. The main problem resides with broad topic queries. These are queries for which a typical text-based search engine like AltaVista would return thousands of pages. A remedy for these situations was proposed by Kleinberg in his 1-IITS algorithm in which he uses the hyperlink structure of the Web as a major source of information about the contents of the Web. In this thesis, ...
  • Akhras, Chukri (Notre Dame University-Louaize, 2003)
    Administration of access control was and still is a crucial, critical and complex aspect of Security Administration. Many models were developed and used to effect this administration such as Mandatory access Control (MAC), Discretionary Access Control (DAC) and Role Base access Control. the latter, RBAC which is a flexible and policy-independent access control, represents a natural structure of an organization where functions are grouped into roles and users are permitted to one or more of these roles. In large organizations with relatively large systems, with hundreds of roles and users and ...
  • Nassif, Jacques (Notre Dame University-Louaize, 2003)
    This thesis starts by exploring background areas of study such as incomplete and uncertain information in relational database, belief change in artificial intelligence. It also reminds of how some types of incompleteness and uncertainly can be modeled through disjunctive databases. The paper describes the language being used in addition to some update operators. This thesis then brings to light a new theory in belief change called the weak revision. It first shows the need for such a new operator through a real life example. Second it introduces this new operator by defining its general behavior. ...
  • Mouawad, Pauline (Notre Dame University-Louaize, 2004)
    This thesis is motivated by the latest work related to differential compression algorithms as it appears in the work of Ajtai, et al. - 2002. In particular, we pay special attention to delta encoding algorithms that achieve got compression in linear time and constant space. This is important because previous work in this area uses either quadratic time and constant space or linear time and linear space, which is unacceptable for large inputs. In delta encoding, the algorithm reads two different copies of the same file as input, termed the reference copy and the version copy. The output of the ...
  • Azar, Edgard (Notre Dame University-Louaize, 2004)
    The emerging field of wireless sensor networks combines sensing, computation, and communication into a single tiny device. Through advanced mesh networking protocols, these devices form a sea of connectivity that uses any possible communication path by hopping data from one node to another in search of its destination. While the capabilities of any single device are minimal, the collection of hundreds of sensors offers major new technological possibilities. Examples of usage scenarios for these devices are real-time tracking and security monitoring, issues that will be studied in this thesis. ...
  • Dhaini, Bassel H. (Notre Dame University-Louaize, 2004)
    The aim of data mining as a scientific research is developing methods to analyze large amounts of data in order to discover interesting regularities or exceptions. Typical problems, which should be resolved during developing effective data mining algorithms, arise from the large sizes of both: The data sets used in the data mining process and the patterns results sets (for example in rules) which form discovered knowledge. Scientific researchers are oriented to find the most advantageous (i.e. most effective) solutions both during the data preparation stage and exploration and finally post- ...
  • Hatoum, Oussama (Notre Dame University-Louaize, 2004)
    This thesis aim is defining a new meaning for microprogramming as we know it. Microprogramming was seen from two different views. In commercial applications microprogramming was treated primarily as an emulation tool. This allowed systems such as the IMB system/386 to implement both backward and forward compatibility. In military applications microprograming was considered as a tool for building optimized and fault tolerance control units. Dynamic and user microprogramming are usually used to refer to the same concept. In this thesis we will make a clear distinction between the two terms. User ...
  • Faddoul, Fady S. (Notre Dame University-Louaize, 2004)
    Software components enable practical reuse of software parts and amortization of investments over multiple applications. Software components are binary units of independent production, acquisition that are combined together to form a functioning system. Building solution by combining bought and made components improves quality and supports rapid development, leading to short time to market. For these reasons, component technology is expected by many to be the corner stone of software in the year to come. Even though component software is a very promising way of building applications, it is very ...
  • Bouorm, Ramez (Notre Dame University-Louaize, 2005)
    The classic way for communication between database and applications is performed using ODBC (for standard applications) and DLL files (for distributed applications). The job of theses API's is to connect to database for sending and retrieving information. We introduce the WDBC pattern that is designed to do the same tasks but in addition, it guarantees the safety of data (by doing backup of database over the network) and can be integrated in an application that is created with different programming languages and running on different operating systems.
  • Abboud, Joelle P. (Notre Dame University-Louaize, 2005)
    Internet banking is somehow a new technology used by banks to interact with their customers providing them with a wide range of services available online. These services can be classified into 5 categories: informational, administrative, transactional, portal and others. However with these come new challenges, risks and threats when adapting internet banking that are either inherited from the internet or that are specific to the open banking environment. Therefore, specific security requirements to the internet banking environment should be adopted aiming to control these risks and manage ...
  • Hashem, Jinane N. (Notre Dame University-Louaize, 2005)
    Metadata is considered a very useful and valuable component in handing data and delivering decisional information, in managing contents on the Internet, in databases and warehouses, in enabling the finding of relevant information, and in effectively providing a multiplicity of useful services. Data, in point of facts, can be metaphorically compared to a dead substance; and all acknowledge the fact that data, by merely existing in systems, represents almost nothing. However, it is the awareness of the exact length and value of this data that builds the valuable expensive information. This thesis ...
  • Farah, Fahed E. (Notre Dame University-Louaize, 2005)
    The purpose of this thesis is to discuss the methods used to evaluate open source software in content management systems, and take a real case using open source content management software and illustrate the problem, evaluate the software, apply the evaluation methods and study its features. The software in this case is called Zope, which is an open source software application server used to design and build content management systems, intranets, portals and applications that are traditionally used. This software is written in the Python language, one of the most highly efficient object oriented ...
  • Bechara, Reine (Notre Dame University-Louaize, 2005)
    Enterprise resource planning – ERP – is among the latest technologies that companies have undertaken. Typically it is a software package that has a centralized database for several modules; these modules could be customized based on the organization’s needs. Since the cost of an ERP implementation is considered to be very high, it is critical for organizations to make it a success and start having return on their investment. But what makes an ERP implementation project successful? How to evaluate its success? These are the questions addressed by the thesis. Answering these questions, a research ...
  • Eid, Fadi (Notre Dame University-Louaize, 2005)
    This thesis tackles Performability issues in Wireless sensors networks. Performability is a mission-specific measure of system effectiveness that seeks to combine the traditional reliability and performance measures of a system. Wireless Sensor networks consist of a huge number of small sensor nodes, which communicate wirelessly. These sensor nodes can be spread out in hard accessible areas by what new applications fields can be pointed out [13]. This thesis aims to provide wireless communication architecture for Petroleum installations, such as off shore platforms and on shore processing units, ...
  • Hamadeh, Sakr (Notre Dame University-Louaize, 2005)
    UML is an acronym for Unified Modelling Language. It has become de facto the standard for the object-oriented software analysis and design stages in software development. UML is a visual modelling language, and it consists of a set of diagrams. Static diagrams are used to depict static structure of a program, where is dynamic diagrams specify how the control flow(s) of the program should behave. The examples of behavioral diagrams are a Sate diagram, which describes the behavior of objects of a given class, and a Sequence diagram, which describes inter-object interactions in a given scenario. A ...

Search DSpace


Advanced Search

Browse

My Account