Institutional Repository

Browsing Theses and Dissertations by Title

Browsing Theses and Dissertations by Title

Sort by: Order: Results:

  • Akhras, Chukri (Notre Dame University-Louaize, 2003)
    Administration of access control was and still is a crucial, critical and complex aspect of Security Administration. Many models were developed and used to effect this administration such as Mandatory access Control (MAC), Discretionary Access Control (DAC) and Role Base access Control. the latter, RBAC which is a flexible and policy-independent access control, represents a natural structure of an organization where functions are grouped into roles and users are permitted to one or more of these roles. In large organizations with relatively large systems, with hundreds of roles and users and ...
  • Abboud, Joelle P. (Notre Dame University-Louaize, 2005)
    Internet banking is somehow a new technology used by banks to interact with their customers providing them with a wide range of services available online. These services can be classified into 5 categories: informational, administrative, transactional, portal and others. However with these come new challenges, risks and threats when adapting internet banking that are either inherited from the internet or that are specific to the open banking environment. Therefore, specific security requirements to the internet banking environment should be adopted aiming to control these risks and manage ...
  • El-Hayek, Naji R. (Notre Dame University-Louaize, 2000)
    In this thesis digital image is introduced as an amount of data, which is produced when a 2-D light intensity function is sampled and quantized to create a digital image. Its principle objective is to define the segmentation process, in which we can partition an image into meaningful regions that correspond to part of, or the whole of objects within a scene. This is done by systematically dividing the whole image up into its constituent areas or regions. If the regions do not correspond directly to a physical object, or object surface, then they should correspond to some area of uniformity. Major ...
  • El Khoury Badran, Miriam (Notre Dame University-Louaize, 2019-05)
    With the rise of the Internet, recommender systems are becoming a used solution to solve the information overload problem. These systems are like any other system, subject to noise: malicious noise that is caused by attacks and natural noise that is due to the human error. Many detection algorithms solve the noise problem. However, since natural noise and serendipity overlap in their definition, removing noise results in removing serendipity. Serendipity that is the happy surprise of finding something relevant unexpectedly is important for the issue of over personalization caused by the recommender ...
  • Mina, Jean G. (Notre Dame University-Louaize, 1998-07)
    The allocation problem is known to be NP-Hard in the most general case where both the number of modules and the number of processors is arbitrary, and it is also Np-Complete in some of the restricted cases. Also, the general scheduling problem, where no restrictions are imposed on the interconnection structure between modules, on the modules processing time and on the number of parallel processors, is NP-Hard in the strong sense. Even under some restrictions, the scheduling problem is NP-Hard. In some other restricted cases, it is known to be NP-Complete. In this thesis, we first review fifty ...
  • Simonian, Roy (Notre Dame University-Louaize, 2022)
    The world is witnessing nowadays a virus that spreads in a very fast manner and it has infected a large number of people. Countries rushed to find ways to stop this virus from spreading and to minimize the risks of getting infected. One of these ways was to integrate technology in people’s daily routine to help in containing the virus. In fact, although several countries took a lot of legal measurements and law enforcement to prevent the spread of the virus, such as wearing facial masks, social distancing, using sanitizers and other forms of hygiene supplements, there were always the need to ...
  • Aoun, Mario A. (Notre Dame University-Louaize., 2007)
    The aim of this thesis is to deluge the latest studies in chaotic dynamics and their relevance in neural computing, as also to inspect a new learning algorithm for a network of chaotic spiking neurons as it is recently proposed by Nigel Crook et al. [1]. The thesis will tackle the latest research in the field of information processing and chaotic neural networks, and will contribute to the recent work of Nigel Crook et al. [1] by finding a suitable learning algorithm for chaotic neurons. The learning algorithm based on biological realism will be implemented in a network of chaotic spiking ...
  • Mouawad, Pauline (Notre Dame University-Louaize, 2004)
    This thesis is motivated by the latest work related to differential compression algorithms as it appears in the work of Ajtai, et al. - 2002. In particular, we pay special attention to delta encoding algorithms that achieve got compression in linear time and constant space. This is important because previous work in this area uses either quadratic time and constant space or linear time and linear space, which is unacceptable for large inputs. In delta encoding, the algorithm reads two different copies of the same file as input, termed the reference copy and the version copy. The output of the ...
  • Akl, Imad M. (Notre Dame University-Louaize, 2002-06)
    This thesis uses the HITS algorithm as a basis to propose an interactive internet search engine. With the Web becoming a major source of information for many users, it became a necessity to be able to search the Web efficiently. The main problem resides with broad topic queries. These are queries for which a typical text-based search engine like AltaVista would return thousands of pages. A remedy for these situations was proposed by Kleinberg in his 1-IITS algorithm in which he uses the hyperlink structure of the Web as a major source of information about the contents of the Web. In this thesis, ...
  • Haddad, Mireille J. (Notre Dame University-Louaize, 2017)
    Maintenance is the most costly phase of the software life cycle. The maintenance cost of a program is estimated to be over 80% of its total life cycle costs (Erlikh, 2000). Since most of the maintenance time is devoted to understanding the program itself, program comprehension becomes essential. Often, a large fraction of the maintenance time is spent on reading code to understand what functionality of the program it implements. An insufficiently documented source code can be challenging for developers to understand and maintain. A clear and concise documentation can help developers ...
  • Abboud, Micheline (Notre Dame University-Louaize, 2005-04)
    The Grid initiative provides an infrastructure for distributed computation among widely distributed high-performance computers. This will allow for exchanging and processing very large amounts of data. There are a huge number of applications that are geographically distributed such as multi-point radio facility for astrophysics, space physics, atmospheric physics, and radio research, utilizing very high performance Grid Computing. It is expected that similar applications to become important in commercial settings, initially for scientific and technical computing applications and then for commercial ...
  • El Daccache, Walid (Notre Dame University-Louaize, 2001)
    The World Wide Web is considered by far to be a simple and universal standard for exchanging information. This information that started to be manually composed and human readable, needed to grow more to reach dynamic composition and machine readability. Static web documents starved for a light breeze to release it from data and presentation mixture and lift it to a higher level of data representation and organization. XML "the extensible markup language'' as a standard of data representation on the web offered flexibility and simplicity in representing self describing electronic documents. This ...
  • Al-Halaby, Ramzi R. (Notre Dame University-Louaize., 1999-06)
  • Mansour, Emile N. (Notre Dame University-Louaize, 2002)
    Mobility attracts many developers and system designers; it will give us the ability to use our computers with no physical limitations with respect to connections. This thesis will try to introduce the main concepts that define mobile computing in our days. It will identify the challenges that face mobile computing and their impact on current developments in this area. Location management and how the cellular networks function is defined and described. We will conduct a comparison between protocols in location management with respect to network messages and database operations. In the IS-41 model ...
  • Zeaiter, Leonardo (Notre Dame University-Louaize, 2005)
    In this thesis, we demonstrate how developers can make use of the model driven architecture (MDA) techniques to make the software development process more reliable, robust and less costly. We will focus on discussing a set of transformation techniques that together, transform a PSM (Platform Specific Model) into a code model written in Visual Basic.NET and an ER (Entity Relationship) model developed using SQL (Structured query Language) and targeting the Microsoft SQL Server relational database management system. The source model is assumed to be represented using UML (Unified Modeling Language). ...
  • Chmeit, Nader (Notre Dame University-Louaize, 2012-07)
    The scheduling problem is one of the most challenging problems faced in many different areas of everyday life. This problem can be formulated as a combinatorial optimization problem, and it has been solved with various methods using heuristics and intelligent algorithms. We present in this research an efficient solution to the scheduling problem using two different heuristics namely Simulated Annealing and Ant Colony Optimization. A study comparing the performances of both solutions is described and the results are analyzed.
  • Rammouz, Veronica (Notre Dame University-Louaize, 2021)
    The internet has made room for lots of unwanted activity to propagate through computers. In response, many methods were established to detect a certain computer executable as malicious. However, there were still loopholes for hackers within traditional systems. Some methods use machine learning others use deep learning. There are some drawbacks to each method, such as reverse analysis and restricted simulation on different execution paths, as well as long execution time. Some methods cannot generalize well and cannot scale to large amounts of data. Moreover, anti-viruses, using signature-based ...
  • Bouorm, Ramez (Notre Dame University-Louaize, 2005)
    The classic way for communication between database and applications is performed using ODBC (for standard applications) and DLL files (for distributed applications). The job of theses API's is to connect to database for sending and retrieving information. We introduce the WDBC pattern that is designed to do the same tasks but in addition, it guarantees the safety of data (by doing backup of database over the network) and can be integrated in an application that is created with different programming languages and running on different operating systems.
  • Nassif, Jacques (Notre Dame University-Louaize, 2003)
    This thesis starts by exploring background areas of study such as incomplete and uncertain information in relational database, belief change in artificial intelligence. It also reminds of how some types of incompleteness and uncertainly can be modeled through disjunctive databases. The paper describes the language being used in addition to some update operators. This thesis then brings to light a new theory in belief change called the weak revision. It first shows the need for such a new operator through a real life example. Second it introduces this new operator by defining its general behavior. ...
  • Mouawad, Maurice T. (Notre Dame University-Louaize, 2001-06)
    The web is a vast source of information. However, due to the divisiveness and unlikeness of web pages' contents, this information is covered in the chaotic structure of the World Wide Web. At the same time, with the spread of web access, search engines are being, if not the sole utility, one of the most mechanisms used by the increasing number of users, to find interesting information. We are interested in identifying how pieces of information represented by URL pages, sharing common topics, are related as they are represented on the web. One such problem is studying patterns of occurrences of ...

Search DSpace


Advanced Search

Browse

My Account