Institutional Repository

Browsing Theses and Dissertations by Author "Khair, Marie, Ph.D."

Browsing Theses and Dissertations by Author "Khair, Marie, Ph.D."

Sort by: Order: Results:

  • El-Jerdy, Firas François (Notre Dame University-Louaize, 2022-07)
    Quantum key distribution uses special purpose hardware and quantum mechanics to distribute cryptographic keys in a system for its usage in a classical symmetric key scheme for encryption and decryption. There are two appeals for going to such length of creating special hardware and utilizing quantum mechanics to distribute keys over parties. First, detecting eavesdropping on communication due to the fundamental properties of photons governed by quantum mechanics. Second, offering a solution to the byproduct effect of quantum computers breaking the most common asymmetric schemes (Transport Layer ...
  • Khalil, Nazih E. (Notre Dame University-Louaize, 1999-07)
    Data Fragmentation is a heuristic problem in the design of a distributed database. Its purpose is to maximize the locality of reference, minimize data access at remote site, and to decrease the number of disk accesses in the system. In this thesis, we review the design a homogeneous distributed database. As the design is a heuristic problem, we also review a number of algorithms suggested as solutions to the three types of fragmentation: vertical, horizontal or mixed. Next, we propose that a previously implemented routine entitled "a transaction-based vertical partitioning algorithm" can be ...
  • Aad, Elie (Notre Dame University-Louaize, 2002)
    Mining association rules has been an important topic in data mining research in recent years from the standpoint of supporting human-centered discovery of knowledge. The present day model of mining association rules suffers from the following shortcomings: (i) lack of user exploration and control, (ii) lack of focus, (iii) huge number of rules technically unreadable. All data mining researchers, have given a high importance on developing fast algorithms for rules discovery, and have applied different types of constraints in different algorithms to prune item sets, that do not occur frequently ...
  • Hashem, Jinane N. (Notre Dame University-Louaize, 2005)
    Metadata is considered a very useful and valuable component in handing data and delivering decisional information, in managing contents on the Internet, in databases and warehouses, in enabling the finding of relevant information, and in effectively providing a multiplicity of useful services. Data, in point of facts, can be metaphorically compared to a dead substance; and all acknowledge the fact that data, by merely existing in systems, represents almost nothing. However, it is the awareness of the exact length and value of this data that builds the valuable expensive information. This thesis ...
  • Akhras, Chukri (Notre Dame University-Louaize, 2003)
    Administration of access control was and still is a crucial, critical and complex aspect of Security Administration. Many models were developed and used to effect this administration such as Mandatory access Control (MAC), Discretionary Access Control (DAC) and Role Base access Control. the latter, RBAC which is a flexible and policy-independent access control, represents a natural structure of an organization where functions are grouped into roles and users are permitted to one or more of these roles. In large organizations with relatively large systems, with hundreds of roles and users and ...
  • Abboud, Joelle P. (Notre Dame University-Louaize, 2005)
    Internet banking is somehow a new technology used by banks to interact with their customers providing them with a wide range of services available online. These services can be classified into 5 categories: informational, administrative, transactional, portal and others. However with these come new challenges, risks and threats when adapting internet banking that are either inherited from the internet or that are specific to the open banking environment. Therefore, specific security requirements to the internet banking environment should be adopted aiming to control these risks and manage ...
  • Abboud, Micheline (Notre Dame University-Louaize, 2005-04)
    The Grid initiative provides an infrastructure for distributed computation among widely distributed high-performance computers. This will allow for exchanging and processing very large amounts of data. There are a huge number of applications that are geographically distributed such as multi-point radio facility for astrophysics, space physics, atmospheric physics, and radio research, utilizing very high performance Grid Computing. It is expected that similar applications to become important in commercial settings, initially for scientific and technical computing applications and then for commercial ...
  • Mansour, Emile N. (Notre Dame University-Louaize, 2002)
    Mobility attracts many developers and system designers; it will give us the ability to use our computers with no physical limitations with respect to connections. This thesis will try to introduce the main concepts that define mobile computing in our days. It will identify the challenges that face mobile computing and their impact on current developments in this area. Location management and how the cellular networks function is defined and described. We will conduct a comparison between protocols in location management with respect to network messages and database operations. In the IS-41 model ...

Search DSpace


Advanced Search

Browse

My Account