Institutional Repository

Browsing Theses and Dissertations by Title

Browsing Theses and Dissertations by Title

Sort by: Order: Results:

  • Kahwagi, Roger (Notre Dame University-Louaize, 2007)
    This thesis examines the different type of agents, and how they help evolve the world around, most particularly the way business are undertaken and handled. The following work is based upon the DALIA environment, which stands for Distributed Autonomous and Linguistically Competent Agents. In this work I have extended and improved the DALIA agent negotiation aspect, where two agents are involved in an offer and counter-offer negotiations. The model presented by DALIA for the offers and counter offers ia investigated and the weak points in the negotiation paradigm are identified. A strategy is ...
  • Chaaya, Georges (Notre Dame University-Louaize, 2015-06)
    Anomaly detection is the process of finding outlying record from a given data set. This problem has been of increasing importance due to the increase in the size of the data and the need to efficiently extract those outlying records that can have important indications in real-life problems. Anomaly detection is applied in many different sectors. There are many approaches to solve the anomaly detection problem. However, those that are more widely applicable are unsupervised approaches as they do not require labeled data. The aim of this thesis is to study a well-known anomaly detection technique ...
  • Abou-Jaoude, Abdo Milad (Notre Dame University-Louaize, 1998-05)
  • Al Youssef, Jad (Notre Dame University-Louaize, 2019-05)
    The aim of this thesis is to study the impact of a three-year-study of computer science at Notre Dame University on the students’ academic performances. For this reason, the GPAs of the students after their first year of study were compared with their GPAs upon graduation. To perform this, a Decision Tree, as well as Neural Networks were used. These algorithms helped us to predict the final GPA based on the first two semesters’ GPA. In addition, the most decisive courses on the student GPA were identified. For this reason, Relief algorithm was used to identify the three most important courses ...
  • Merheb, Charbel Michel (Notre Dame University-Louaize, 2020-12-21)
    Technology and educational systems have been going hand in hand over the years, creating various digital examination platforms to further improve and digitize the pen and paper examination process in schools and universities. However, these improvements still offer the same stress and anxiety a student may experience during a pen and paper exam. Virtual reality technology has been making its way to desktop computers and mobile phones and its use has varied between many fields including medical, scientific, and military. In this thesis, the use of virtual reality technology focuses on the education ...
  • Dhaini, Bassel H. (Notre Dame University-Louaize, 2004)
    The aim of data mining as a scientific research is developing methods to analyze large amounts of data in order to discover interesting regularities or exceptions. Typical problems, which should be resolved during developing effective data mining algorithms, arise from the large sizes of both: The data sets used in the data mining process and the patterns results sets (for example in rules) which form discovered knowledge. Scientific researchers are oriented to find the most advantageous (i.e. most effective) solutions both during the data preparation stage and exploration and finally post- ...
  • Geagea, Marybel (Notre Dame University-Louaize, 2019-05)
    The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a test used to differentiate between humans and machines. In this thesis, we have implemented a deep neural network architecture to automatically recognize CAPTCHAs. The main idea behind this thesis is to test the reliability of test-based CAPTCHAs in differentiating between humans and machines. We utilized convolutional neural networks instead of the conventional strategies of CAPTCHA breaking which, typically, use segmentation techniques. Our model is comprised of 8 layers to learn textbased images; ...
  • Balian, Armen A. (Notre Dame University-Louaize, 1999)
    In this thesis, automatic segmentation of liver veins from ultrasound slices is implemented and further rendered into 3D image to assist the medical doctor to more accurately apply any study intended on the liver. The main part of this study is the texture analysis since it is the hardest problem in common. As a start, 4 different techniques in texture analysis have been introduced, the Spatial Gray-level Dependence Matrices (SGLDM), The Fourier Power Spectrum (FPS), The Gray- Level Difference Statistics (GLD), and Law's Texture Energy Measure (TEM). Each of these methods have been discussed ...
  • Eid, Maria George (Notre Dame University-Louaize, 2022-05)
    There is no doubt that animation is becoming one of the biggest advertising trends and approaches in modern times. No need to wonder why! Simply put, animated advertisement gives us a video that is promotional and entertaining at the same time; leaving the consumer captured by the visuals and animation. With the relevance of animated advertisement in today’s world, this thesis aims to provide a comparative overview of animated vs non-animated advertising. The thesis shall study the “Soul Drops” animated commercial starting from scratch, to the procedures carried on until reaching the result.
  • Hatoum, Oussama (Notre Dame University-Louaize, 2004)
    This thesis aim is defining a new meaning for microprogramming as we know it. Microprogramming was seen from two different views. In commercial applications microprogramming was treated primarily as an emulation tool. This allowed systems such as the IMB system/386 to implement both backward and forward compatibility. In military applications microprograming was considered as a tool for building optimized and fault tolerance control units. Dynamic and user microprogramming are usually used to refer to the same concept. In this thesis we will make a clear distinction between the two terms. User ...
  • Keyrouz, Karam (Notre Dame University-Louaize, 2018-02)
    Nearly 1.3 million people die in road crashes each year and 20 to 50 million people are injured or disabled. This made automated car accident prevention and detection a topic of extreme interest worldwide. However, as of yet, the different systems that have been proposed and implemented, do not take underdeveloped countries into account despite their greater need. This is probably due to the fact that this problem is already hard enough to tackle without adding more constraints to it. In addition, these constraints have not been identified and lack of awareness regarding the importance of this ...
  • Tauk, Ziad (Notre Dame University-Louaize., 2009-12)
    Retail space planning is an accurate and complex process affecting the overall performance of a retail environment. Such task, confronting large retailers consisting of huge malls and hypermarkets, appears infinite in the absence of a complete automated process, starting from the store plan generation, passing by the optimal product assortment and finishing with the product-to-shelf allocation problem. Moreover, the ever-changing factors affecting the retail space planning process, such as merchandising rules, competitive strategies and consumer behavior require continuous follow-up and optimization ...
  • El-Jerdy, Firas François (Notre Dame University-Louaize, 2022-07)
    Quantum key distribution uses special purpose hardware and quantum mechanics to distribute cryptographic keys in a system for its usage in a classical symmetric key scheme for encryption and decryption. There are two appeals for going to such length of creating special hardware and utilizing quantum mechanics to distribute keys over parties. First, detecting eavesdropping on communication due to the fundamental properties of photons governed by quantum mechanics. Second, offering a solution to the byproduct effect of quantum computers breaking the most common asymmetric schemes (Transport Layer ...
  • Shammas, Shady J. (Notre Dame University-Louaize, 1999)
    Over the last few years, LAN technologies have been driven by the need to support an increasing number of users as well as bandwidth intensive applications. As new and existing network applications evolve to embrace high-resolution graphics, video and other rich media types, pressure is growing at the desktop, the server, the hub and the switch for increased bandwidth. All this has led to new network protocols needed to support the amount of information required. In this thesis, we will briefly review conventional networking protocols and internetworking devices. Then we present a table comparing ...
  • Farah, Fahed E. (Notre Dame University-Louaize, 2005)
    The purpose of this thesis is to discuss the methods used to evaluate open source software in content management systems, and take a real case using open source content management software and illustrate the problem, evaluate the software, apply the evaluation methods and study its features. The software in this case is called Zope, which is an open source software application server used to design and build content management systems, intranets, portals and applications that are traditionally used. This software is written in the Python language, one of the most highly efficient object oriented ...
  • Nouhra, Virona (Notre Dame University-Louaize, 2018)
    In the last few years, Cloud Storage has taken a new turn in becoming the latest trend to create a huge impact in the IT world. Amazon Drive is a cloud storage mobile applications created by Amazon. This application provides online and easy access to documents, music, photos and videos saved in your cloud drive. Due to the importance and widespread of the cloud, not only regular users, but also criminals have taken advantage of the services provided by this new technology to commit digital crimes. Digital forensics is a branch of forensic sciences that aims at ...
  • Hamam, Samer (Notre Dame University-Louaize., 2015-02)
    Student academic advising is an educational decision support process required nowadays to be automated for both the student and advisor to speed up the planning process of course registration by finding out the optimal sequencing or prioritization of students degree requirements to enroll in for next semesters based on their academic standing in a way that suits students’ interests and meets overall graduation requirements within a time frame. This thesis integrated all the rules and constraints from all precedent references relevant to this subject that impacts the scheduling process and proposed ...
  • Mansour, Mélanie (Notre Dame University-Louaize, 2019)
    Big data is an evolved term for large volume of unstructured, semi-structured and structured data having the potential to be used and mined for information in machine learning projects and other advanced analytics applications. Big data is the new driver of the world societal changes and economic. The world’s data collection is reaching a tipping point for major technological changes that can bring different ways in finance, decision-making, cities, managing our health, and education. Latest technological improvements in computing, data handling, data storage, and trading have transformed the ...
  • Akiki, Pierre (Notre Dame University-Louaize, 2007)
    The term spatial data signifies all geometric objects of different dimensions and the relations that could bind these objects together. Spatial data is, in general, divided into two parts: crisp spatial data and vague spatial data. Crisp spatial data has determinate coordinates and boundaries, whereas vague spatial data has indeterminate ones. The demand for spatial data support in database management systems is growing every day, yet not all commercial products provide spatial data support natively, and those that do merely provide it partially. Since database management systems are at the heart ...
  • Gemael, Nader A. (Notre Dame University-Louaize, 2018-05)
    Cloud computing ecosystem is one of the trends currently being discussed in the domain of information technology and computing. Computing ecosystem allows smart usage of technology which means unneeded resources are saved such as power, computing resources, spaces for datacenters as well as saving huge amount of CO2 and electric circuit boards and machines. Cloud federation and its underlying techniques, is considered role model in sharing and expanding cloud business to provide better and cheaper services for end-users. In this thesis, we will survey and compare existing Identity Access Management ...

Search DSpace


Advanced Search

Browse

My Account