Institutional Repository

Department of Computer Science

Department of Computer Science

Recent Submissions

  • Essaye, Anthony (Notre Dame University-Louaize, 2021)
    Quantum Computers, the next wave of computing, and an emerging field in computer science have brought numerous advancements to problem solving and a quantum approach to programming a certain machine. This thesis tackles three main areas in the approach to quantum computers. First, the thesis provides a state-of-the-art review to Quantum computers/ Second it proposes a timeline for the progress of the technology and highlights the importance of early action. Finally, it focuses on the implications of such advancements on the current standards of network security. Specifically, it proposes ...
  • Merheb, Charbel Michel (Notre Dame University-Louaize, 2020-12-21)
    Technology and educational systems have been going hand in hand over the years, creating various digital examination platforms to further improve and digitize the pen and paper examination process in schools and universities. However, these improvements still offer the same stress and anxiety a student may experience during a pen and paper exam. Virtual reality technology has been making its way to desktop computers and mobile phones and its use has varied between many fields including medical, scientific, and military. In this thesis, the use of virtual reality technology focuses on the education ...
  • Eid, Christian (Notre Dame University-Louaize., 2020)
    Existing smart contract development languages are unique to their related block chain platforms. Thus, multiple versions of the same smart contract must be developed for different block chains. This thesis presents a model-driven approach to smart contract development with automatic code generation. This approach encompasses a new XML-based programming language to develop smart contracts and a code generator that transforms those contracts to a platform-specific programming language. The XML-based language was discussed, and all supported constructs were illustrated. The code generation tool ...
  • Nassif, Jacques (Notre Dame University-Louaize, 2003)
    This thesis starts by exploring background areas of study such as incomplete and uncertain information in relational database, belief change in artificial intelligence. It also reminds of how some types of incompleteness and uncertainly can be modeled through disjunctive databases. The paper describes the language being used in addition to some update operators. This thesis then brings to light a new theory in belief change called the weak revision. It first shows the need for such a new operator through a real life example. Second it introduces this new operator by defining its general behavior. ...
  • El-Hayek, Naji R. (Notre Dame University-Louaize, 2000)
    In this thesis digital image is introduced as an amount of data, which is produced when a 2-D light intensity function is sampled and quantized to create a digital image. Its principle objective is to define the segmentation process, in which we can partition an image into meaningful regions that correspond to part of, or the whole of objects within a scene. This is done by systematically dividing the whole image up into its constituent areas or regions. If the regions do not correspond directly to a physical object, or object surface, then they should correspond to some area of uniformity. Major ...
  • Hamadeh, Sakr (Notre Dame University-Louaize, 2005)
    UML is an acronym for Unified Modelling Language. It has become de facto the standard for the object-oriented software analysis and design stages in software development. UML is a visual modelling language, and it consists of a set of diagrams. Static diagrams are used to depict static structure of a program, where is dynamic diagrams specify how the control flow(s) of the program should behave. The examples of behavioral diagrams are a Sate diagram, which describes the behavior of objects of a given class, and a Sequence diagram, which describes inter-object interactions in a given scenario. A ...
  • Maroun, Bashir M. (Notre Dame University-Louaize, 2001)
    This thesis uses the link structure of the World Wide Web as a basis to create better search engines. It focuses on the HITS algorithm, which was the first algorithm to up the link topology. HITS is implemented with slight modifications and tested with variations of its input parameters. It is also used in order to discover emerging communities in cyberspace. Other related algorithms, which use the link structure of the web as an undirected graph are described and compared with HITS. Finally, an attempt to combine link-based with text-based analysis in order to create more accurate search methods ...
  • Karam, Rita (Notre Dame University-Louaize, 2002)
    This thesis discusses Artificial Economy with applications to Reinforcement Learning. It focuses first on Reinforcement Learning, comparing it to other types of learning such as Supervised Learning. It then covers a historical overview of the field and summarizes the current works. The work described in this thesis has a psychological approach as we focus on reward and punishment. We experiment Artificial Economy with a prototype which solves the Blocks World problem. We then show how the Artificial Economy approach can be integrated with other concepts of Reinforcement Learning techniques.
  • Faddoul, Fady S. (Notre Dame University-Louaize, 2004)
    Software components enable practical reuse of software parts and amortization of investments over multiple applications. Software components are binary units of independent production, acquisition that are combined together to form a functioning system. Building solution by combining bought and made components improves quality and supports rapid development, leading to short time to market. For these reasons, component technology is expected by many to be the corner stone of software in the year to come. Even though component software is a very promising way of building applications, it is very ...
  • Eid, Fadi (Notre Dame University-Louaize, 2005)
    This thesis tackles Performability issues in Wireless sensors networks. Performability is a mission-specific measure of system effectiveness that seeks to combine the traditional reliability and performance measures of a system. Wireless Sensor networks consist of a huge number of small sensor nodes, which communicate wirelessly. These sensor nodes can be spread out in hard accessible areas by what new applications fields can be pointed out [13]. This thesis aims to provide wireless communication architecture for Petroleum installations, such as off shore platforms and on shore processing units, ...
  • Bechara, Reine (Notre Dame University-Louaize, 2005)
    Enterprise resource planning – ERP – is among the latest technologies that companies have undertaken. Typically it is a software package that has a centralized database for several modules; these modules could be customized based on the organization’s needs. Since the cost of an ERP implementation is considered to be very high, it is critical for organizations to make it a success and start having return on their investment. But what makes an ERP implementation project successful? How to evaluate its success? These are the questions addressed by the thesis. Answering these questions, a research ...
  • Ghanem, Pascale Y. (Notre Dame University-Louaize, 2001)
    The global Internet has experienced many years of sustained exponential growth doubling in size every nine months or faster [8]. Millions of users at tens of thousands of sites around the world depend on the global Internet as part of their daily work environment. This massive use of the Internet as well as the continuous interconnection of new groups arises many problems such as: packet loss, network congestion, insufficient bandwidth, increase in delay... In this thesis, we focus mainly on the problem of communication delay and bandwidth allocation. Our main goal is to find a way to minimize ...
  • Boutros, Rania A. (Notre Dame University-Louaize, 1999)
    A well known problem with wormhole-routed packet networks is the potentially large amount of blocking that packets can experience due to link contention. Because of the very limited amount of buffering in such networks, blocked packets remain in the network and keep using network resources. Thus, blocked packets may in turn cause other packets to be blocked. This may affect a large number of packets over a large portion of the network. Proper connection management strategies and appropriate protocols must be devised to ensure that blocking of packets due to link contention is bounded. In [3], ...
  • Balian, Armen A. (Notre Dame University-Louaize, 1999)
    In this thesis, automatic segmentation of liver veins from ultrasound slices is implemented and further rendered into 3D image to assist the medical doctor to more accurately apply any study intended on the liver. The main part of this study is the texture analysis since it is the hardest problem in common. As a start, 4 different techniques in texture analysis have been introduced, the Spatial Gray-level Dependence Matrices (SGLDM), The Fourier Power Spectrum (FPS), The Gray- Level Difference Statistics (GLD), and Law's Texture Energy Measure (TEM). Each of these methods have been discussed ...
  • Karaa, George Emile (Notre Dame University-Louaize, 2001)
    This thesis addresses the problem of analysis the Web hyperlink structure in order to locate authoritative web pages relevant to a certain query subject. In particular, we discuss the HITS algorithm, a pioneering method that exploits the web link structure in order to locate important information sources, as well as other algorithms based on HITS such as ARC and Page Rank. We experiment with different aspects of HITS, and introduce new heuristics for assigning the link weights based on textual contexts.
  • Akhras, Chukri (Notre Dame University-Louaize, 2003)
    Administration of access control was and still is a crucial, critical and complex aspect of Security Administration. Many models were developed and used to effect this administration such as Mandatory access Control (MAC), Discretionary Access Control (DAC) and Role Base access Control. the latter, RBAC which is a flexible and policy-independent access control, represents a natural structure of an organization where functions are grouped into roles and users are permitted to one or more of these roles. In large organizations with relatively large systems, with hundreds of roles and users and ...
  • Hatoum, Oussama (Notre Dame University-Louaize, 2004)
    This thesis aim is defining a new meaning for microprogramming as we know it. Microprogramming was seen from two different views. In commercial applications microprogramming was treated primarily as an emulation tool. This allowed systems such as the IMB system/386 to implement both backward and forward compatibility. In military applications microprograming was considered as a tool for building optimized and fault tolerance control units. Dynamic and user microprogramming are usually used to refer to the same concept. In this thesis we will make a clear distinction between the two terms. User ...
  • Bouorm, Ramez (Notre Dame University-Louaize, 2005)
    The classic way for communication between database and applications is performed using ODBC (for standard applications) and DLL files (for distributed applications). The job of theses API's is to connect to database for sending and retrieving information. We introduce the WDBC pattern that is designed to do the same tasks but in addition, it guarantees the safety of data (by doing backup of database over the network) and can be integrated in an application that is created with different programming languages and running on different operating systems.
  • Farah, Fahed E. (Notre Dame University-Louaize, 2005)
    The purpose of this thesis is to discuss the methods used to evaluate open source software in content management systems, and take a real case using open source content management software and illustrate the problem, evaluate the software, apply the evaluation methods and study its features. The software in this case is called Zope, which is an open source software application server used to design and build content management systems, intranets, portals and applications that are traditionally used. This software is written in the Python language, one of the most highly efficient object oriented ...
  • Zeaiter, Leonardo (Notre Dame University-Louaize, 2005)
    In this thesis, we demonstrate how developers can make use of the model driven architecture (MDA) techniques to make the software development process more reliable, robust and less costly. We will focus on discussing a set of transformation techniques that together, transform a PSM (Platform Specific Model) into a code model written in Visual Basic.NET and an ER (Entity Relationship) model developed using SQL (Structured query Language) and targeting the Microsoft SQL Server relational database management system. The source model is assumed to be represented using UML (Unified Modeling Language). ...

View more