FACULTY OF NATURAL & APPLIED SCIENCES: Recent submissions

  • Eid, Maria George (Notre Dame University-Louaize, 2022-05)
    There is no doubt that animation is becoming one of the biggest advertising trends and approaches in modern times. No need to wonder why! Simply put, animated advertisement gives us a video that is promotional and entertaining at the same time; leaving the consumer captured by the visuals and animation. With the relevance of animated advertisement in today’s world, this thesis aims to provide a comparative overview of animated vs non-animated advertising. The thesis shall study the “Soul Drops” animated commercial starting from scratch, to the procedures carried on until reaching the result.
  • El Hayek Bou Mansour, Michella (Notre Dame University-Louaize, 2021-12)
    Abrupt work schedules, such as nightshifts, are prevalent nowadays and are known to cause circadian misalignment and sleep disruption which can have adverse health consequences. Among the well documented pathologies among night workers are cardiometabolic impairments, the effects of which appear to be more disruptive in older adults due to their poorer adaptation to night work schedules. The physiological mechanisms by which night shift work and sleep disruption contribute to increased cardiovascular disease (CVD) risk are poorly understood. Furthermore, the potential role of specific CVD ...
  • Shaabo, Layal (Notre Dame University-Louaize, 2022-05)
    Chronic sleep restriction (CSR) has been implicated in higher risk of insulin resistance (IR) and immune-metabolic dysfunction. No studies investigated the effect of CSR on macrophage differentiation in vWAT in relation to leptin synthesis and glucose homeostasis. Therefore, this study aimed at assessing blood glucose levels and vWAT expression of leptin, CD38, and CD163 following CSR. Adult male C57BL/6 mice were housed under 12:12 L/D cycle (lights on at 0700 hrs) with free access to food. Following a two-week acclimatization period, animals were divided into 2 groups: 1) control (C, N=8) ...
  • Mahfouz, Etienne (Notre Dame University-Louaize, 2013)
    We need the following definitions: An integral domain is a commutative unitary ring with no zero divisors. A principal ideal domain (PID) is an integral domain in which every ideal can be generated by one element. A unique factorization domain (UFD) is an integral domain in which factorization of integers into primes is unique. (more details later). An integral domain R is said to be a Euclidean ring if for every a≠0 in R there is a defined integer d(a) such that: For all a,b € R, both non zero, d(a) ≤d(ab). For all a,b € R, both non zero, there exists t,r € R such that a=tb+r where either r=0 ...
  • Younes, Ceaser (Notre Dame University-Louaize, 2014)
    Web services are form of middleware to exchange information between systems over a network. With the advent of the age of mobile devices and their diversity, the importance of web services became all the more apparent. Every web service grants certain functionality and can utilize other web services to gain more functionality and more robustness. Such a service that combines the functionality of other services is called a composite service and the process of designing such a service is called a composition. This thesis studies an on-the-fly algorithm that efficiently checks for the possibility ...
  • Semaan, Georgio (Notre Dame University-Louaize, 2021-05)
    In recent times, a new technology – Blockchain was brought forward to the global society. The world is using the term ‘Blockchain technology’ to signify diverse things such as the Bitcoin Blockchain, virtual currencies like Cardano and XRP, and smart contracts. Blockchain-based applications are springing up, covering several fields comprising financial services, reputation system and Internet of Things (IoT), and so on. Generally, Blockchain is implicit to be distributed ledgers that is a list of transactions verified and stored into blocks and shared among a number of computer nodes in a ...
  • Tohme, Celine (Notre Dame University-Louaize, 2016)
    Several studies have shown a link between pesticide exposure and neurological problems. In the present study, we show the effect of twenty common pesticides (dieldrin, rotenone, endosulfan, penconazole, trifiuralin, dicofol, chloropropham, hexachlorobenzene, thiamethoxam, dimethoate, maneb, p,p' -DDE, paraquat, permethrin, chlorfenapyr, propanil, kresoxim-methyl, boscalid, triadimefon, lambda-cyhalothrin) on myelin gene expression (PLP and MBP) in oligodendrocytes. We first studied the toxicology of each chemical to determine the doses to consider by calculating the ration of dead to living ...
  • Haddad, Mireille J. (Notre Dame University-Louaize, 2017)
    Maintenance is the most costly phase of the software life cycle. The maintenance cost of a program is estimated to be over 80% of its total life cycle costs (Erlikh, 2000). Since most of the maintenance time is devoted to understanding the program itself, program comprehension becomes essential. Often, a large fraction of the maintenance time is spent on reading code to understand what functionality of the program it implements. An insufficiently documented source code can be challenging for developers to understand and maintain. A clear and concise documentation can help developers ...
  • Yoghourdjian, Vahan Artine (Notre Dame University-Louaize, 2013-06)
    In the world of computing, one major statement has always been true: the request for computing power is always greater than the available resources. For this reason, scientists and researchers started considering the concept of sharing resources. In the last decade, the world of computing has seen a big leap forward with the emergence of cloud computing. In this new paradigm, computing resources of data centers spread all over the world can be shared to provide increased power and availability to users. However, with this increase in computing power came along an exponential increase in energy ...
  • Rammouz, Veronica (Notre Dame University-Louaize, 2021)
    The internet has made room for lots of unwanted activity to propagate through computers. In response, many methods were established to detect a certain computer executable as malicious. However, there were still loopholes for hackers within traditional systems. Some methods use machine learning others use deep learning. There are some drawbacks to each method, such as reverse analysis and restricted simulation on different execution paths, as well as long execution time. Some methods cannot generalize well and cannot scale to large amounts of data. Moreover, anti-viruses, using signature-based ...
  • Salem, Elie (Notre Dame University-Louaize, 2006)
    A denial of service (DoS) attack is an attempt by a person or a group of persons to cripple an online service. This can have serious consequences on companies like Amazon and eBay, which rely on their online availability to do business. Many defense mechanisms have been proposed to thwart DoS attacks. One of these defense mechanisms is called hop-count filtering. Although an attacker can forge any field in the IP header, he or she cannot falsify the number of hops an IP packet takes to reach its destination. This hop-count information can be inferred from the time-to-live value in the IP header. ...
  • Azzi, Ziad (Notre Dame University-Louaize, 2005)
    Wireless sensor networking is an increasingly important technology that is used in a variety of applications, such as environmental monitoring, infrastructure management, public safety, medical, home and office security, transportation and military systems. However, until now, wireless sensor networks (WSNs) and their applications have been developed without considering an integrated management solution. This thesis analyzes in detail emerging wireless sensor management schemes and proposes a hybrid network model that establishes a combination between event-driven and continuous WSNs. The main ...
  • Fayad, Rawan (Notre Dame University-Louaize, 2021-12)
    In this thesis, we present a new proof of the fundamental theorem of calculus of the Lebesgue Integral [1] and we explore the properties of a new and interesting Lebesgue integrable function [2]. In this thesis, we reveal the main connection between “absolute continuity” and “Lebesgue Integration” that is established from the fundamental theorem of calculus for the Lebesgue integral. And a function which is Lebesgue integrable but not Riemann integrable. In chapter 1, an elementary and simple proof of the fundamental theorem calculus for the Lebesgue integral is given. The proof is based on the ...
  • Khalil, Nazih E. (Notre Dame University-Louaize, 1999-07)
    Data Fragmentation is a heuristic problem in the design of a distributed database. Its purpose is to maximize the locality of reference, minimize data access at remote site, and to decrease the number of disk accesses in the system. In this thesis, we review the design a homogeneous distributed database. As the design is a heuristic problem, we also review a number of algorithms suggested as solutions to the three types of fragmentation: vertical, horizontal or mixed. Next, we propose that a previously implemented routine entitled "a transaction-based vertical partitioning algorithm" can be ...
  • Akiki, Pierre (Notre Dame University-Louaize, 2007)
    The term spatial data signifies all geometric objects of different dimensions and the relations that could bind these objects together. Spatial data is, in general, divided into two parts: crisp spatial data and vague spatial data. Crisp spatial data has determinate coordinates and boundaries, whereas vague spatial data has indeterminate ones. The demand for spatial data support in database management systems is growing every day, yet not all commercial products provide spatial data support natively, and those that do merely provide it partially. Since database management systems are at the heart ...
  • Al Ghandour, Maria Gerges (Notre Dame University-Louaize, 2021)
    In today's world, protecting information has become one of the most difficult tasks. Cyber security events and data breaches continue to be expensive events that affect people and businesses all around the world. A breach occurs when sensitive information is accessed. Moreover, cyber threats are constantly evolving in order to take advantage of online behavior and trends, especially when teleworking has become a necessity due to the global invasion and prevalence of the Coronavirus disease 2019 during the past two years. Therefore, the necessity for cyber insurance, which covers the liability ...
  • Abdel Massih, Hisham (Notre Dame University-Louaize, 2000)
    Recent research in Geographic Information Systems (GISs) has created the kind of systems capable of modeling a number of interesting real world phenomena. Some applications where GISs have made significant contribution include routing, scheduling, dispatching, transportation logistics, vehicle tracking, market research, construction Planning, facility management and resource distribution. However, there seems to exist little connection between GIS solutions and much related research being carried out in other disciplines. This thesis studies the advantages of integrating recent research in ...
  • Yammine, Rebecca (Notre Dame University-Louaize, 2020-12)
    The Lagrange’s Mean Value Theorem is a very important result in Analysis. It originated from Rolle’s theorem, which was proved by the French mathematician Michel Rolle (1652-1719) for polynomials in 1691. This theorem appeared for the first time in the book “M´ethode pour r´esoudre les ´egalit´es” without a proof and without any special emphasis. Rolle’s Theorem got its recogni- tion when Joseph Lagrange (1736-1813) presented his mean value theorem in his book “Th´eorie des functions analytiques” in 1797. It received further recognition when Augustin Louis Cauchy (1789- 1857) proved his mean ...
  • Mahmoud, Faten (Notre Dame University-Louaize, 2021)
    Fuzzy measure theory is a generalization of classical measure theory. It was first introduced by Lotfi Zadeh in 1965 in his famous paper ”Fuzzy Sets”. After more than 50 years of the existence and development of classical measure theory, mathematicians felt that the additivity property is, in some applications, too restrictive. It is also unrealistic under real and physical conditions where measurement errors are unavoidable. According to Sugeno, fuzzy measures are obtained by replacing the additivity condition of classical measures with weaker conditions of monotonicity and continuity. Chapter ...
  • Danageuzian, Hrair Razmig (Notre Dame University-Louaize, 2021)
    The term operational risk became widespread in the late 1990s when central bank representatives of twelve countries formed a working committee; the Basel Committee on Banking Supervision (BCBS). The BCBS defines operational risk as the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. This research aims to model operational risk data using the Loss Distribution Approach under BCBS requirements. Simulated data was used consisting of 3,192 operational loss events between the years 2009 and 2018. The implementation of the LDA was ...

Search DSpace


Advanced Search

Browse

My Account