Institutional Repository

Browsing Theses and Dissertations by Issue Date

Browsing Theses and Dissertations by Issue Date

Sort by: Order: Results:

  • Khalil, Fadi Y. (Notre Dame University-Louaize, 2018)
    With the advancement in computing and wireless technologies, the world has witnessed a growing number of connected devices to the Internet at an unpretending rate. Fog computing emerges as an alternative solution to reduce the burden of Data Centers in traditional Cloud Computing and to support geographically distributed, latency sensitive, and QoS-aware IoT appliations. Fog Computing suggests, that the intelligence should move from the data centers to the edge of network. The main objective of this thesis is to determine the significance and feasibility of implementing a broker node between ...
  • Keyrouz, Karam (Notre Dame University-Louaize, 2018-02)
    Nearly 1.3 million people die in road crashes each year and 20 to 50 million people are injured or disabled. This made automated car accident prevention and detection a topic of extreme interest worldwide. However, as of yet, the different systems that have been proposed and implemented, do not take underdeveloped countries into account despite their greater need. This is probably due to the fact that this problem is already hard enough to tackle without adding more constraints to it. In addition, these constraints have not been identified and lack of awareness regarding the importance of this ...
  • Gemael, Nader A. (Notre Dame University-Louaize, 2018-05)
    Cloud computing ecosystem is one of the trends currently being discussed in the domain of information technology and computing. Computing ecosystem allows smart usage of technology which means unneeded resources are saved such as power, computing resources, spaces for datacenters as well as saving huge amount of CO2 and electric circuit boards and machines. Cloud federation and its underlying techniques, is considered role model in sharing and expanding cloud business to provide better and cheaper services for end-users. In this thesis, we will survey and compare existing Identity Access Management ...
  • Mansour, Mélanie (Notre Dame University-Louaize, 2019)
    Big data is an evolved term for large volume of unstructured, semi-structured and structured data having the potential to be used and mined for information in machine learning projects and other advanced analytics applications. Big data is the new driver of the world societal changes and economic. The world’s data collection is reaching a tipping point for major technological changes that can bring different ways in finance, decision-making, cities, managing our health, and education. Latest technological improvements in computing, data handling, data storage, and trading have transformed the ...
  • El Khoury Badran, Miriam (Notre Dame University-Louaize, 2019-05)
    With the rise of the Internet, recommender systems are becoming a used solution to solve the information overload problem. These systems are like any other system, subject to noise: malicious noise that is caused by attacks and natural noise that is due to the human error. Many detection algorithms solve the noise problem. However, since natural noise and serendipity overlap in their definition, removing noise results in removing serendipity. Serendipity that is the happy surprise of finding something relevant unexpectedly is important for the issue of over personalization caused by the recommender ...
  • Geagea, Marybel (Notre Dame University-Louaize, 2019-05)
    The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a test used to differentiate between humans and machines. In this thesis, we have implemented a deep neural network architecture to automatically recognize CAPTCHAs. The main idea behind this thesis is to test the reliability of test-based CAPTCHAs in differentiating between humans and machines. We utilized convolutional neural networks instead of the conventional strategies of CAPTCHA breaking which, typically, use segmentation techniques. Our model is comprised of 8 layers to learn textbased images; ...
  • Al Youssef, Jad (Notre Dame University-Louaize, 2019-05)
    The aim of this thesis is to study the impact of a three-year-study of computer science at Notre Dame University on the students’ academic performances. For this reason, the GPAs of the students after their first year of study were compared with their GPAs upon graduation. To perform this, a Decision Tree, as well as Neural Networks were used. These algorithms helped us to predict the final GPA based on the first two semesters’ GPA. In addition, the most decisive courses on the student GPA were identified. For this reason, Relief algorithm was used to identify the three most important courses ...
  • Rizk, Sara (Notre Dame University-Louaize, 2019-05)
    Taxon identification is highly needed for a wide variety of research including ecology, agronomy and medicine. As of 1970, classification of plants was introduced into computer vision techniques. Most research conducted in this area focuses on leaves due to their availability as well as their ability to discretize. The most common features researchers base their work on are shape, texture and venation. This research study proposes a dual path, dual feature model for plant leaf identification. We weigh our research on shape and venation features. Sobel operators are used for primary and secondary ...
  • Eid, Christian (Notre Dame University-Louaize., 2020)
    Existing smart contract development languages are unique to their related block chain platforms. Thus, multiple versions of the same smart contract must be developed for different block chains. This thesis presents a model-driven approach to smart contract development with automatic code generation. This approach encompasses a new XML-based programming language to develop smart contracts and a code generator that transforms those contracts to a platform-specific programming language. The XML-based language was discussed, and all supported constructs were illustrated. The code generation tool ...
  • Merheb, Charbel Michel (Notre Dame University-Louaize, 2020-12-21)
    Technology and educational systems have been going hand in hand over the years, creating various digital examination platforms to further improve and digitize the pen and paper examination process in schools and universities. However, these improvements still offer the same stress and anxiety a student may experience during a pen and paper exam. Virtual reality technology has been making its way to desktop computers and mobile phones and its use has varied between many fields including medical, scientific, and military. In this thesis, the use of virtual reality technology focuses on the education ...
  • Essaye, Anthony (Notre Dame University-Louaize, 2021)
    Quantum Computers, the next wave of computing, and an emerging field in computer science have brought numerous advancements to problem solving and a quantum approach to programming a certain machine. This thesis tackles three main areas in the approach to quantum computers. First, the thesis provides a state-of-the-art review to Quantum computers/ Second it proposes a timeline for the progress of the technology and highlights the importance of early action. Finally, it focuses on the implications of such advancements on the current standards of network security. Specifically, it proposes ...
  • Sfeir, Mikel (Notre Dame University-Louaize, 2021)
    “In the truth there is no news and in the news there is no truth”, a soviet-era political joke, still applies to the present times. This study will highlight all the communication forms and how they are used nowadays as a tool for propaganda especially in the digital world. When website traffic, clicks, and reach are at stake, information disorder in the form of misleading/fake information would be used as a tool to enhance data metrics across the digital world. This study tackles information disorder during all its phases: creation, production, communication, and the user experience through ...
  • Rammouz, Veronica (Notre Dame University-Louaize, 2021)
    The internet has made room for lots of unwanted activity to propagate through computers. In response, many methods were established to detect a certain computer executable as malicious. However, there were still loopholes for hackers within traditional systems. Some methods use machine learning others use deep learning. There are some drawbacks to each method, such as reverse analysis and restricted simulation on different execution paths, as well as long execution time. Some methods cannot generalize well and cannot scale to large amounts of data. Moreover, anti-viruses, using signature-based ...
  • Moussa, Jad (Notre Dame University-Louaize, 2021-01-15)
    Marine observatories based on sensor networks provide continuous ocean monitoring. The design phase of such systems, which is part of the complete development life cycle, is a complex and challenging task. The design difficulties may induce the designers to make architectural design errors during the design phase. This study aims to identify the best design approach that helps sensor networks designers in preventing errors and validating models at an early phase. In addition, it introduces a new environmental constraint that should be taken into consideration when building design models. To ...
  • Semaan, Georgio (Notre Dame University-Louaize, 2021-05)
    In recent times, a new technology – Blockchain was brought forward to the global society. The world is using the term ‘Blockchain technology’ to signify diverse things such as the Bitcoin Blockchain, virtual currencies like Cardano and XRP, and smart contracts. Blockchain-based applications are springing up, covering several fields comprising financial services, reputation system and Internet of Things (IoT), and so on. Generally, Blockchain is implicit to be distributed ledgers that is a list of transactions verified and stored into blocks and shared among a number of computer nodes in a ...
  • Simonian, Roy (Notre Dame University-Louaize, 2022)
    The world is witnessing nowadays a virus that spreads in a very fast manner and it has infected a large number of people. Countries rushed to find ways to stop this virus from spreading and to minimize the risks of getting infected. One of these ways was to integrate technology in people’s daily routine to help in containing the virus. In fact, although several countries took a lot of legal measurements and law enforcement to prevent the spread of the virus, such as wearing facial masks, social distancing, using sanitizers and other forms of hygiene supplements, there were always the need to ...
  • Eid, Maria George (Notre Dame University-Louaize, 2022-05)
    There is no doubt that animation is becoming one of the biggest advertising trends and approaches in modern times. No need to wonder why! Simply put, animated advertisement gives us a video that is promotional and entertaining at the same time; leaving the consumer captured by the visuals and animation. With the relevance of animated advertisement in today’s world, this thesis aims to provide a comparative overview of animated vs non-animated advertising. The thesis shall study the “Soul Drops” animated commercial starting from scratch, to the procedures carried on until reaching the result.
  • El Haddad, Anthony (Notre Dame University-Louaize, 2022-07)
    With the considerable rise of Internet users and the massive and diverse web searches, an excess of data has become available online. A recommendation model, also known as an engine, handles this massive amount of data available to find patterns that reflect user behaviors. Recommendation models have been implemented in several industries, and the most popular implementation is in the entertainment industry, specifically video streaming and on-demand platforms. There are several types of recommendation systems. In this paper, we have proposed a way to escape the loop created by the recommendation ...
  • Saliba, Charbel (Notre Dame University-Louaize, 2022-07)
    This research aims to validate the viability of implementing NFT mechanics in a video game. It discusses the blockchain technology’s limitations, as well as the many restrictions that NFT forces on game developers. Be it their immutable nature, their high minting cost, or their incapacity of holding big data. It also highlights the restrictions that prevent the interoperability of game assets, and finally, the ludicrous Play-to-earn business model. Two games are also developed, Crypto Forgers and Crypto Run, to further validate the findings presented by this research. While these two games are ...
  • El-Jerdy, Firas François (Notre Dame University-Louaize, 2022-07)
    Quantum key distribution uses special purpose hardware and quantum mechanics to distribute cryptographic keys in a system for its usage in a classical symmetric key scheme for encryption and decryption. There are two appeals for going to such length of creating special hardware and utilizing quantum mechanics to distribute keys over parties. First, detecting eavesdropping on communication due to the fundamental properties of photons governed by quantum mechanics. Second, offering a solution to the byproduct effect of quantum computers breaking the most common asymmetric schemes (Transport Layer ...

Search DSpace


Advanced Search

Browse

My Account