Institutional Repository

Browsing Theses and Dissertations by Title

Browsing Theses and Dissertations by Title

Sort by: Order: Results:

  • Younes, Ceaser (Notre Dame University-Louaize, 2014)
    Web services are form of middleware to exchange information between systems over a network. With the advent of the age of mobile devices and their diversity, the importance of web services became all the more apparent. Every web service grants certain functionality and can utilize other web services to gain more functionality and more robustness. Such a service that combines the functionality of other services is called a composite service and the process of designing such a service is called a composition. This thesis studies an on-the-fly algorithm that efficiently checks for the possibility ...
  • Samia, Mireille I. (Notre Dame University-Louaize, 2001-06)
    Internet Multicast service extends the Internet point-to-point unicast delivery to a multi-point delivery. Multicasting means that a datagram is sent to multiple sites at more or less the same time. To support real-time multimedia, the minimization of delay without loosing the reliability of the network is required. To achieve this goal, we have proposed to change the architecture of a multicast one-stage network to a multicast hierarchical two-stage network. We have proved that by giving additional functionalities (such as back-up and error correction) to the intermediate sites (i.e. mrouters) ...
  • Eid, Fadi (Notre Dame University-Louaize, 2005)
    This thesis tackles Performability issues in Wireless sensors networks. Performability is a mission-specific measure of system effectiveness that seeks to combine the traditional reliability and performance measures of a system. Wireless Sensor networks consist of a huge number of small sensor nodes, which communicate wirelessly. These sensor nodes can be spread out in hard accessible areas by what new applications fields can be pointed out [13]. This thesis aims to provide wireless communication architecture for Petroleum installations, such as off shore platforms and on shore processing units, ...
  • Khalil, Fadi Y. (Notre Dame University-Louaize, 2018)
    With the advancement in computing and wireless technologies, the world has witnessed a growing number of connected devices to the Internet at an unpretending rate. Fog computing emerges as an alternative solution to reduce the burden of Data Centers in traditional Cloud Computing and to support geographically distributed, latency sensitive, and QoS-aware IoT appliations. Fog Computing suggests, that the intelligence should move from the data centers to the edge of network. The main objective of this thesis is to determine the significance and feasibility of implementing a broker node between ...
  • Chelala, Maria Ghosn (Notre Dame University-Louaize, 2006)
    With the current rising trend in wireless based systems, applications such as video on demand, remote monitoring and surveillance are now being used in greater abundance. Coupled with this growth comes the ongoing need for improved network performance. This is due to the resource hungry nature of video data which places stringent requirements on communication networks. This study investigates performance improvement for remote surveillance applications over hybrid 2-stage disordering networks. It specifically focuses on resequencing alternatives for video data. A resequencing and batch aggregation ...
  • Sfeir, Elias (Notre Dame University-Louaize, 2012)
    Delay-Tolerant Networks (DTNs) are a type of emerging networks characterized by very long delay paths, frequent network partitions and high loss rates. The nodes are sparsely deployed and intermittently connected. The presenting network is used in a variety of environments including military, disaster situations and for long distance communications. Although it is used in critical sectors, the communication support lacks the high end technology usually found in important networks. The nodes participating in this network do not have stable end-to-end connections. They can communicate to each other ...
  • Rizk, Sara (Notre Dame University-Louaize, 2019-05)
    Taxon identification is highly needed for a wide variety of research including ecology, agronomy and medicine. As of 1970, classification of plants was introduced into computer vision techniques. Most research conducted in this area focuses on leaves due to their availability as well as their ability to discretize. The most common features researchers base their work on are shape, texture and venation. This research study proposes a dual path, dual feature model for plant leaf identification. We weigh our research on shape and venation features. Sobel operators are used for primary and secondary ...
  • Aad, Elie (Notre Dame University-Louaize, 2002)
    Mining association rules has been an important topic in data mining research in recent years from the standpoint of supporting human-centered discovery of knowledge. The present day model of mining association rules suffers from the following shortcomings: (i) lack of user exploration and control, (ii) lack of focus, (iii) huge number of rules technically unreadable. All data mining researchers, have given a high importance on developing fast algorithms for rules discovery, and have applied different types of constraints in different algorithms to prune item sets, that do not occur frequently ...
  • Essaye, Anthony (Notre Dame University-Louaize, 2021)
    Quantum Computers, the next wave of computing, and an emerging field in computer science have brought numerous advancements to problem solving and a quantum approach to programming a certain machine. This thesis tackles three main areas in the approach to quantum computers. First, the thesis provides a state-of-the-art review to Quantum computers/ Second it proposes a timeline for the progress of the technology and highlights the importance of early action. Finally, it focuses on the implications of such advancements on the current standards of network security. Specifically, it proposes ...
  • Karaa, George Emile (Notre Dame University-Louaize, 2001)
    This thesis addresses the problem of analysis the Web hyperlink structure in order to locate authoritative web pages relevant to a certain query subject. In particular, we discuss the HITS algorithm, a pioneering method that exploits the web link structure in order to locate important information sources, as well as other algorithms based on HITS such as ARC and Page Rank. We experiment with different aspects of HITS, and introduce new heuristics for assigning the link weights based on textual contexts.
  • Soueidy, Amine (Notre Dame University-Louaize, 2001)
    This thesis discusses the topic of learning in a complex environment. Both the historical basis of the field and a broad selection of the current works are summarized. Reinforcement learning is the problem faced by an agent that learns behavior through trial-and-error interactions with a dynamic environment. The work described here has a resemblance to work in psychology, but considerably in the details and in the use of the word "reinforcement". We describe the foundations of new field of reinforcement learning named artificial economy. We experiment with a prototype based on the artificial ...
  • Sfeir, Mikel (Notre Dame University-Louaize, 2021)
    “In the truth there is no news and in the news there is no truth”, a soviet-era political joke, still applies to the present times. This study will highlight all the communication forms and how they are used nowadays as a tool for propaganda especially in the digital world. When website traffic, clicks, and reach are at stake, information disorder in the form of misleading/fake information would be used as a tool to enhance data metrics across the digital world. This study tackles information disorder during all its phases: creation, production, communication, and the user experience through ...
  • Mhanna, Françoise (Notre Dame University-Louaize, 2006)
    The 80/20 rule says that 20% of the customers produce 80% of the sales; this rule indicates the existence of hidden sales potentials that must be revealed. Those hidden sales potentials can only be discovered by building acustomer profile. A smart customer profile finds the high potential targets, creates CRM strategies, and starts programs to sell the hidden targets. Shifting just a small percentage of the customers whom are not generating profit to the top group of customers generating profit adds significantly sales growth increase profits. Customer profile puts the full picture together to ...
  • Hashem, Jinane N. (Notre Dame University-Louaize, 2005)
    Metadata is considered a very useful and valuable component in handing data and delivering decisional information, in managing contents on the Internet, in databases and warehouses, in enabling the finding of relevant information, and in effectively providing a multiplicity of useful services. Data, in point of facts, can be metaphorically compared to a dead substance; and all acknowledge the fact that data, by merely existing in systems, represents almost nothing. However, it is the awareness of the exact length and value of this data that builds the valuable expensive information. This thesis ...
  • Azar, Edgard (Notre Dame University-Louaize, 2004)
    The emerging field of wireless sensor networks combines sensing, computation, and communication into a single tiny device. Through advanced mesh networking protocols, these devices form a sea of connectivity that uses any possible communication path by hopping data from one node to another in search of its destination. While the capabilities of any single device are minimal, the collection of hundreds of sensors offers major new technological possibilities. Examples of usage scenarios for these devices are real-time tracking and security monitoring, issues that will be studied in this thesis. ...
  • Akhras, Chukri (Notre Dame University-Louaize, 2003)
    Administration of access control was and still is a crucial, critical and complex aspect of Security Administration. Many models were developed and used to effect this administration such as Mandatory access Control (MAC), Discretionary Access Control (DAC) and Role Base access Control. the latter, RBAC which is a flexible and policy-independent access control, represents a natural structure of an organization where functions are grouped into roles and users are permitted to one or more of these roles. In large organizations with relatively large systems, with hundreds of roles and users and ...
  • Abboud, Joelle P. (Notre Dame University-Louaize, 2005)
    Internet banking is somehow a new technology used by banks to interact with their customers providing them with a wide range of services available online. These services can be classified into 5 categories: informational, administrative, transactional, portal and others. However with these come new challenges, risks and threats when adapting internet banking that are either inherited from the internet or that are specific to the open banking environment. Therefore, specific security requirements to the internet banking environment should be adopted aiming to control these risks and manage ...
  • El-Hayek, Naji R. (Notre Dame University-Louaize, 2000)
    In this thesis digital image is introduced as an amount of data, which is produced when a 2-D light intensity function is sampled and quantized to create a digital image. Its principle objective is to define the segmentation process, in which we can partition an image into meaningful regions that correspond to part of, or the whole of objects within a scene. This is done by systematically dividing the whole image up into its constituent areas or regions. If the regions do not correspond directly to a physical object, or object surface, then they should correspond to some area of uniformity. Major ...
  • El Khoury Badran, Miriam (Notre Dame University-Louaize, 2019-05)
    With the rise of the Internet, recommender systems are becoming a used solution to solve the information overload problem. These systems are like any other system, subject to noise: malicious noise that is caused by attacks and natural noise that is due to the human error. Many detection algorithms solve the noise problem. However, since natural noise and serendipity overlap in their definition, removing noise results in removing serendipity. Serendipity that is the happy surprise of finding something relevant unexpectedly is important for the issue of over personalization caused by the recommender ...
  • Mina, Jean G. (Notre Dame University-Louaize, 1998-07)
    The allocation problem is known to be NP-Hard in the most general case where both the number of modules and the number of processors is arbitrary, and it is also Np-Complete in some of the restricted cases. Also, the general scheduling problem, where no restrictions are imposed on the interconnection structure between modules, on the modules processing time and on the number of parallel processors, is NP-Hard in the strong sense. Even under some restrictions, the scheduling problem is NP-Hard. In some other restricted cases, it is known to be NP-Complete. In this thesis, we first review fifty ...

Search DSpace


Advanced Search

Browse

My Account