Institutional Repository

Browsing Theses and Dissertations by Title

Browsing Theses and Dissertations by Title

Sort by: Order: Results:

  • Eid, Christian (Notre Dame University-Louaize., 2020)
    Existing smart contract development languages are unique to their related block chain platforms. Thus, multiple versions of the same smart contract must be developed for different block chains. This thesis presents a model-driven approach to smart contract development with automatic code generation. This approach encompasses a new XML-based programming language to develop smart contracts and a code generator that transforms those contracts to a platform-specific programming language. The XML-based language was discussed, and all supported constructs were illustrated. The code generation tool ...
  • Kokozaki, Michel R. (Notre Dame University-Louaize, 2000)
    This thesis deals with the modeling of comlex three-dimensional objects, and emphasizes on the Boolean operations between objects. It discusses a modification of the ray-casting method, which offers an improved performance over the regular ray-casting method. A small simulation will be performed, on a personal computer, about how to draw three-dimentional primitives and shading them using the wire-frame technique, plus performing Boolean operations between two objects using the modified version of the ray-casting method. Data structures and the main drawing algorithms that were created for this ...
  • Saliba, Charbel (Notre Dame University-Louaize, 2022-07)
    This research aims to validate the viability of implementing NFT mechanics in a video game. It discusses the blockchain technology’s limitations, as well as the many restrictions that NFT forces on game developers. Be it their immutable nature, their high minting cost, or their incapacity of holding big data. It also highlights the restrictions that prevent the interoperability of game assets, and finally, the ludicrous Play-to-earn business model. Two games are also developed, Crypto Forgers and Crypto Run, to further validate the findings presented by this research. While these two games are ...
  • Semaan, Georgio (Notre Dame University-Louaize, 2021-05)
    In recent times, a new technology – Blockchain was brought forward to the global society. The world is using the term ‘Blockchain technology’ to signify diverse things such as the Bitcoin Blockchain, virtual currencies like Cardano and XRP, and smart contracts. Blockchain-based applications are springing up, covering several fields comprising financial services, reputation system and Internet of Things (IoT), and so on. Generally, Blockchain is implicit to be distributed ledgers that is a list of transactions verified and stored into blocks and shared among a number of computer nodes in a ...
  • Karam, Rita (Notre Dame University-Louaize, 2002)
    This thesis discusses Artificial Economy with applications to Reinforcement Learning. It focuses first on Reinforcement Learning, comparing it to other types of learning such as Supervised Learning. It then covers a historical overview of the field and summarizes the current works. The work described in this thesis has a psychological approach as we focus on reward and punishment. We experiment Artificial Economy with a prototype which solves the Blocks World problem. We then show how the Artificial Economy approach can be integrated with other concepts of Reinforcement Learning techniques.
  • Yazbeck, Khalil Nazih (Notre Dame University-Louaize, 2001)
    This thesis deals with the communication network performance of the Automatic Vehicle Location (AVL) distributed database system. The Automatic Vehicle Location system is used to real-time track the movement of vehicles, traveling along a large geographical area. The full control of the movement of these vehicles requires the use of many communication systems such as Global Positioning system, Packet switching network and distributed database systems including vehicle position databases. The main goal of this thesis is to minimize the update response time in a real-time fully replicated distributed ...
  • Younes, Ceaser (Notre Dame University-Louaize, 2014)
    Web services are form of middleware to exchange information between systems over a network. With the advent of the age of mobile devices and their diversity, the importance of web services became all the more apparent. Every web service grants certain functionality and can utilize other web services to gain more functionality and more robustness. Such a service that combines the functionality of other services is called a composite service and the process of designing such a service is called a composition. This thesis studies an on-the-fly algorithm that efficiently checks for the possibility ...
  • Samia, Mireille I. (Notre Dame University-Louaize, 2001-06)
    Internet Multicast service extends the Internet point-to-point unicast delivery to a multi-point delivery. Multicasting means that a datagram is sent to multiple sites at more or less the same time. To support real-time multimedia, the minimization of delay without loosing the reliability of the network is required. To achieve this goal, we have proposed to change the architecture of a multicast one-stage network to a multicast hierarchical two-stage network. We have proved that by giving additional functionalities (such as back-up and error correction) to the intermediate sites (i.e. mrouters) ...
  • Eid, Fadi (Notre Dame University-Louaize, 2005)
    This thesis tackles Performability issues in Wireless sensors networks. Performability is a mission-specific measure of system effectiveness that seeks to combine the traditional reliability and performance measures of a system. Wireless Sensor networks consist of a huge number of small sensor nodes, which communicate wirelessly. These sensor nodes can be spread out in hard accessible areas by what new applications fields can be pointed out [13]. This thesis aims to provide wireless communication architecture for Petroleum installations, such as off shore platforms and on shore processing units, ...
  • Khalil, Fadi Y. (Notre Dame University-Louaize, 2018)
    With the advancement in computing and wireless technologies, the world has witnessed a growing number of connected devices to the Internet at an unpretending rate. Fog computing emerges as an alternative solution to reduce the burden of Data Centers in traditional Cloud Computing and to support geographically distributed, latency sensitive, and QoS-aware IoT appliations. Fog Computing suggests, that the intelligence should move from the data centers to the edge of network. The main objective of this thesis is to determine the significance and feasibility of implementing a broker node between ...
  • Chelala, Maria Ghosn (Notre Dame University-Louaize, 2006)
    With the current rising trend in wireless based systems, applications such as video on demand, remote monitoring and surveillance are now being used in greater abundance. Coupled with this growth comes the ongoing need for improved network performance. This is due to the resource hungry nature of video data which places stringent requirements on communication networks. This study investigates performance improvement for remote surveillance applications over hybrid 2-stage disordering networks. It specifically focuses on resequencing alternatives for video data. A resequencing and batch aggregation ...
  • Sfeir, Elias (Notre Dame University-Louaize, 2012)
    Delay-Tolerant Networks (DTNs) are a type of emerging networks characterized by very long delay paths, frequent network partitions and high loss rates. The nodes are sparsely deployed and intermittently connected. The presenting network is used in a variety of environments including military, disaster situations and for long distance communications. Although it is used in critical sectors, the communication support lacks the high end technology usually found in important networks. The nodes participating in this network do not have stable end-to-end connections. They can communicate to each other ...
  • Rizk, Sara (Notre Dame University-Louaize, 2019-05)
    Taxon identification is highly needed for a wide variety of research including ecology, agronomy and medicine. As of 1970, classification of plants was introduced into computer vision techniques. Most research conducted in this area focuses on leaves due to their availability as well as their ability to discretize. The most common features researchers base their work on are shape, texture and venation. This research study proposes a dual path, dual feature model for plant leaf identification. We weigh our research on shape and venation features. Sobel operators are used for primary and secondary ...
  • Aad, Elie (Notre Dame University-Louaize, 2002)
    Mining association rules has been an important topic in data mining research in recent years from the standpoint of supporting human-centered discovery of knowledge. The present day model of mining association rules suffers from the following shortcomings: (i) lack of user exploration and control, (ii) lack of focus, (iii) huge number of rules technically unreadable. All data mining researchers, have given a high importance on developing fast algorithms for rules discovery, and have applied different types of constraints in different algorithms to prune item sets, that do not occur frequently ...
  • Essaye, Anthony (Notre Dame University-Louaize, 2021)
    Quantum Computers, the next wave of computing, and an emerging field in computer science have brought numerous advancements to problem solving and a quantum approach to programming a certain machine. This thesis tackles three main areas in the approach to quantum computers. First, the thesis provides a state-of-the-art review to Quantum computers/ Second it proposes a timeline for the progress of the technology and highlights the importance of early action. Finally, it focuses on the implications of such advancements on the current standards of network security. Specifically, it proposes ...
  • Karaa, George Emile (Notre Dame University-Louaize, 2001)
    This thesis addresses the problem of analysis the Web hyperlink structure in order to locate authoritative web pages relevant to a certain query subject. In particular, we discuss the HITS algorithm, a pioneering method that exploits the web link structure in order to locate important information sources, as well as other algorithms based on HITS such as ARC and Page Rank. We experiment with different aspects of HITS, and introduce new heuristics for assigning the link weights based on textual contexts.
  • Soueidy, Amine (Notre Dame University-Louaize, 2001)
    This thesis discusses the topic of learning in a complex environment. Both the historical basis of the field and a broad selection of the current works are summarized. Reinforcement learning is the problem faced by an agent that learns behavior through trial-and-error interactions with a dynamic environment. The work described here has a resemblance to work in psychology, but considerably in the details and in the use of the word "reinforcement". We describe the foundations of new field of reinforcement learning named artificial economy. We experiment with a prototype based on the artificial ...
  • Sfeir, Mikel (Notre Dame University-Louaize, 2021)
    “In the truth there is no news and in the news there is no truth”, a soviet-era political joke, still applies to the present times. This study will highlight all the communication forms and how they are used nowadays as a tool for propaganda especially in the digital world. When website traffic, clicks, and reach are at stake, information disorder in the form of misleading/fake information would be used as a tool to enhance data metrics across the digital world. This study tackles information disorder during all its phases: creation, production, communication, and the user experience through ...
  • Mhanna, Françoise (Notre Dame University-Louaize, 2006)
    The 80/20 rule says that 20% of the customers produce 80% of the sales; this rule indicates the existence of hidden sales potentials that must be revealed. Those hidden sales potentials can only be discovered by building acustomer profile. A smart customer profile finds the high potential targets, creates CRM strategies, and starts programs to sell the hidden targets. Shifting just a small percentage of the customers whom are not generating profit to the top group of customers generating profit adds significantly sales growth increase profits. Customer profile puts the full picture together to ...
  • Hashem, Jinane N. (Notre Dame University-Louaize, 2005)
    Metadata is considered a very useful and valuable component in handing data and delivering decisional information, in managing contents on the Internet, in databases and warehouses, in enabling the finding of relevant information, and in effectively providing a multiplicity of useful services. Data, in point of facts, can be metaphorically compared to a dead substance; and all acknowledge the fact that data, by merely existing in systems, represents almost nothing. However, it is the awareness of the exact length and value of this data that builds the valuable expensive information. This thesis ...

Search DSpace


Advanced Search

Browse

My Account