Institutional Repository

Browsing Theses and Dissertations by Issue Date

Browsing Theses and Dissertations by Issue Date

Sort by: Order: Results:

  • Jabbour, Joseph A. (Notre Dame University-Louaize, 2005)
    The purpose of this thesis is to plan, design, and implement a real and complete lifetime solution for many applications to provide developers and designers with a strong and a good pattern for future development. We have developed a well structured solution, which is basically meant for helping anyone who is involved in the software development cycle in (i) separating the layers, as well as (ii) shortening the development time of the user interface layer, and (iii) controlling the flow of these interfaces. Not to forget (iv) helping the developer with the creation of the data entities, this ...
  • Zeaiter, Leonardo (Notre Dame University-Louaize, 2005)
    In this thesis, we demonstrate how developers can make use of the model driven architecture (MDA) techniques to make the software development process more reliable, robust and less costly. We will focus on discussing a set of transformation techniques that together, transform a PSM (Platform Specific Model) into a code model written in Visual Basic.NET and an ER (Entity Relationship) model developed using SQL (Structured query Language) and targeting the Microsoft SQL Server relational database management system. The source model is assumed to be represented using UML (Unified Modeling Language). ...
  • Azzi, Ziad (Notre Dame University-Louaize, 2005)
    Wireless sensor networking is an increasingly important technology that is used in a variety of applications, such as environmental monitoring, infrastructure management, public safety, medical, home and office security, transportation and military systems. However, until now, wireless sensor networks (WSNs) and their applications have been developed without considering an integrated management solution. This thesis analyzes in detail emerging wireless sensor management schemes and proposes a hybrid network model that establishes a combination between event-driven and continuous WSNs. The main ...
  • Abboud, Micheline (Notre Dame University-Louaize, 2005-04)
    The Grid initiative provides an infrastructure for distributed computation among widely distributed high-performance computers. This will allow for exchanging and processing very large amounts of data. There are a huge number of applications that are geographically distributed such as multi-point radio facility for astrophysics, space physics, atmospheric physics, and radio research, utilizing very high performance Grid Computing. It is expected that similar applications to become important in commercial settings, initially for scientific and technical computing applications and then for commercial ...
  • Mhanna, Françoise (Notre Dame University-Louaize, 2006)
    The 80/20 rule says that 20% of the customers produce 80% of the sales; this rule indicates the existence of hidden sales potentials that must be revealed. Those hidden sales potentials can only be discovered by building acustomer profile. A smart customer profile finds the high potential targets, creates CRM strategies, and starts programs to sell the hidden targets. Shifting just a small percentage of the customers whom are not generating profit to the top group of customers generating profit adds significantly sales growth increase profits. Customer profile puts the full picture together to ...
  • Salem, Elie (Notre Dame University-Louaize, 2006)
    A denial of service (DoS) attack is an attempt by a person or a group of persons to cripple an online service. This can have serious consequences on companies like Amazon and eBay, which rely on their online availability to do business. Many defense mechanisms have been proposed to thwart DoS attacks. One of these defense mechanisms is called hop-count filtering. Although an attacker can forge any field in the IP header, he or she cannot falsify the number of hops an IP packet takes to reach its destination. This hop-count information can be inferred from the time-to-live value in the IP header. ...
  • Chelala, Maria Ghosn (Notre Dame University-Louaize, 2006)
    With the current rising trend in wireless based systems, applications such as video on demand, remote monitoring and surveillance are now being used in greater abundance. Coupled with this growth comes the ongoing need for improved network performance. This is due to the resource hungry nature of video data which places stringent requirements on communication networks. This study investigates performance improvement for remote surveillance applications over hybrid 2-stage disordering networks. It specifically focuses on resequencing alternatives for video data. A resequencing and batch aggregation ...
  • Aoun, Mario A. (Notre Dame University-Louaize., 2007)
    The aim of this thesis is to deluge the latest studies in chaotic dynamics and their relevance in neural computing, as also to inspect a new learning algorithm for a network of chaotic spiking neurons as it is recently proposed by Nigel Crook et al. [1]. The thesis will tackle the latest research in the field of information processing and chaotic neural networks, and will contribute to the recent work of Nigel Crook et al. [1] by finding a suitable learning algorithm for chaotic neurons. The learning algorithm based on biological realism will be implemented in a network of chaotic spiking ...
  • Akiki, Pierre (Notre Dame University-Louaize, 2007)
    The term spatial data signifies all geometric objects of different dimensions and the relations that could bind these objects together. Spatial data is, in general, divided into two parts: crisp spatial data and vague spatial data. Crisp spatial data has determinate coordinates and boundaries, whereas vague spatial data has indeterminate ones. The demand for spatial data support in database management systems is growing every day, yet not all commercial products provide spatial data support natively, and those that do merely provide it partially. Since database management systems are at the heart ...
  • Kahwagi, Roger (Notre Dame University-Louaize, 2007)
    This thesis examines the different type of agents, and how they help evolve the world around, most particularly the way business are undertaken and handled. The following work is based upon the DALIA environment, which stands for Distributed Autonomous and Linguistically Competent Agents. In this work I have extended and improved the DALIA agent negotiation aspect, where two agents are involved in an offer and counter-offer negotiations. The model presented by DALIA for the offers and counter offers ia investigated and the weak points in the negotiation paradigm are identified. A strategy is ...
  • Tauk, Ziad (Notre Dame University-Louaize., 2009-12)
    Retail space planning is an accurate and complex process affecting the overall performance of a retail environment. Such task, confronting large retailers consisting of huge malls and hypermarkets, appears infinite in the absence of a complete automated process, starting from the store plan generation, passing by the optimal product assortment and finishing with the product-to-shelf allocation problem. Moreover, the ever-changing factors affecting the retail space planning process, such as merchandising rules, competitive strategies and consumer behavior require continuous follow-up and optimization ...
  • Sfeir, Elias (Notre Dame University-Louaize, 2012)
    Delay-Tolerant Networks (DTNs) are a type of emerging networks characterized by very long delay paths, frequent network partitions and high loss rates. The nodes are sparsely deployed and intermittently connected. The presenting network is used in a variety of environments including military, disaster situations and for long distance communications. Although it is used in critical sectors, the communication support lacks the high end technology usually found in important networks. The nodes participating in this network do not have stable end-to-end connections. They can communicate to each other ...
  • Chmeit, Nader (Notre Dame University-Louaize, 2012-07)
    The scheduling problem is one of the most challenging problems faced in many different areas of everyday life. This problem can be formulated as a combinatorial optimization problem, and it has been solved with various methods using heuristics and intelligent algorithms. We present in this research an efficient solution to the scheduling problem using two different heuristics namely Simulated Annealing and Ant Colony Optimization. A study comparing the performances of both solutions is described and the results are analyzed.
  • Yoghourdjian, Vahan Artine (Notre Dame University-Louaize, 2013-06)
    In the world of computing, one major statement has always been true: the request for computing power is always greater than the available resources. For this reason, scientists and researchers started considering the concept of sharing resources. In the last decade, the world of computing has seen a big leap forward with the emergence of cloud computing. In this new paradigm, computing resources of data centers spread all over the world can be shared to provide increased power and availability to users. However, with this increase in computing power came along an exponential increase in energy ...
  • Younes, Ceaser (Notre Dame University-Louaize, 2014)
    Web services are form of middleware to exchange information between systems over a network. With the advent of the age of mobile devices and their diversity, the importance of web services became all the more apparent. Every web service grants certain functionality and can utilize other web services to gain more functionality and more robustness. Such a service that combines the functionality of other services is called a composite service and the process of designing such a service is called a composition. This thesis studies an on-the-fly algorithm that efficiently checks for the possibility ...
  • Hamam, Samer (Notre Dame University-Louaize., 2015-02)
    Student academic advising is an educational decision support process required nowadays to be automated for both the student and advisor to speed up the planning process of course registration by finding out the optimal sequencing or prioritization of students degree requirements to enroll in for next semesters based on their academic standing in a way that suits students’ interests and meets overall graduation requirements within a time frame. This thesis integrated all the rules and constraints from all precedent references relevant to this subject that impacts the scheduling process and proposed ...
  • Chaaya, Georges (Notre Dame University-Louaize, 2015-06)
    Anomaly detection is the process of finding outlying record from a given data set. This problem has been of increasing importance due to the increase in the size of the data and the need to efficiently extract those outlying records that can have important indications in real-life problems. Anomaly detection is applied in many different sectors. There are many approaches to solve the anomaly detection problem. However, those that are more widely applicable are unsupervised approaches as they do not require labeled data. The aim of this thesis is to study a well-known anomaly detection technique ...
  • Haddad, Mireille J. (Notre Dame University-Louaize, 2017)
    Maintenance is the most costly phase of the software life cycle. The maintenance cost of a program is estimated to be over 80% of its total life cycle costs (Erlikh, 2000). Since most of the maintenance time is devoted to understanding the program itself, program comprehension becomes essential. Often, a large fraction of the maintenance time is spent on reading code to understand what functionality of the program it implements. An insufficiently documented source code can be challenging for developers to understand and maintain. A clear and concise documentation can help developers ...
  • Nouhra, Virona (Notre Dame University-Louaize, 2018)
    In the last few years, Cloud Storage has taken a new turn in becoming the latest trend to create a huge impact in the IT world. Amazon Drive is a cloud storage mobile applications created by Amazon. This application provides online and easy access to documents, music, photos and videos saved in your cloud drive. Due to the importance and widespread of the cloud, not only regular users, but also criminals have taken advantage of the services provided by this new technology to commit digital crimes. Digital forensics is a branch of forensic sciences that aims at ...
  • El Hayek, Hanine (Notre Dame University-Louaize, 2018)
    Enterprise Resource Planning (ERP) systems are vital for managing any modern-day business. These systems aim to facilitate an organization's work by automating and integrating all business information and processes. However, ERP systems suffer from many problems that may cause an implementation failure. Many of these problems are related to usability, which is affected by the complexity of user interfaces (Uls). Usability can be defined in terms of an end-user's efficiency, effectiveness, and satisfactions. A study was conducted in this thesis to inquire about the usability problems that ...

Search DSpace


Advanced Search

Browse

My Account