.

Browsing by Title

LAUR Repository

Browsing by Title

Sort by: Order: Results:

  • Silver, A.J.; Mawad, M.E.; Hilal, S.K.; Sane, P.; Ganti, S.R. (2019-07-12)
    The carotid space, parapharyngeal space, and paraspinal space are described. The carotid space is shown on computed tomography (CT) to be posterior to the parapharyngeal space and separated from it by the styloid apparatus. ...
  • Silver, A.J.; Mawad, M.E.; Hilal, S.K.; Ascheri, G.F.; Chynn, K.Y.; Baredes, S. (2019-07-11)
    Fourteen neurogenic tumors of the neck were examined with computed tomography (CT) and, in ten cases, angiography. Schwannomas and paragangliomas occurred in the carotid space. These tumors could be distinguished on CT ...
  • Silver, A.J.; Mawad, M.E.; Hilal, S.K.; Ellis, K.; Ganti, S.R.; Sane, P.; Blitzer, A. (2019-07-11)
    Intravenous contrast administration increases the sensitivity of computed tomographic scanning for enlarged cervical lymph nodes but requires a detailed knowledge of neck anatomy, especially in order to distinguish certain ...
  • Silver, A.J.; Mawad, M.E.; Hilal, S.K.; Sane, P.; Ganti, S.R. (2019-07-11)
    The normal computed tomographic anatomy of the nasopharynx and pterygopalatine and infratemporal fossae is analyzed. Particular attention is given to the distinction between deglutitional and masticatory muscles. The ...
  • Silver, A.J.; Mawad, M.E.; Hilal, S.K.; Sane, P.; Ganti, S.R. (2019-07-11)
    Malignant tumors of the nasopharynx were analyzed by region of origin and route of spread. Nasopharyngeal carcinomas produced early submucosal infiltration of the deglutitional muscle layer with enlargement of the levator ...
  • Rawas, Abeer (2011-10-10)
  • Ezzedine, Maher (2011-05-18)
    Information Technology (IT) that is used by developed countries for reasons of economical and political leadership should also be adopted by developing countries, like Lebanon, if these countries wish to survive and compete ...
  • Na'was, Tarek; Hamzeh, Fatima (2018-11-29)
    The objective of this study was to detect the presence of, isolate and identify certain pathogenic bacteria from computers mice in a public university computer center. For this purpose, ten computer mice were randomly and ...
  • Unknown author (2018-11-30)
    Join us in the Computer Science Panel Discussion to learn more about: Skills needed in the Computer Science field. Career paths in Lebanon and the region. Reality of the job market: Positions, salaries, promotions, ...
  • Azar, Danielle; Moussa, Rebecca; Gerges, Firas; Salem, Christian; Akiki, Romario; Falou, Omar (IEEE, 2017-03-14)
    Melanoma is one type of skin cancer that usually develops from prolonged exposure to UV light. The latter triggers mutations that lead skin cells to multiply rapidly and form malignant tumors. If not cured, Melanoma can ...
  • Mohamed, Ashraf; Sgouritsa, Eleni; Morsi, Hesham; Shaltoni, Hashem; Mawad, Michel E.; Kakadiaries, Ioannis A. (SPIE, 2019-07-12)
    Endovascular treatment planning of intracranial aneurysms requires accurate quantification of their geometric parameters, including the neck length, dome height and maximum diameter. Today, the geometry of intracranial ...
  • Kayssi, Ayman; Sharafeddine, Sanaa; Karaki, Houda (2017-01-04)
    Data communications and computer networking (DCCN) has established itself as an essential part of most computer science and engineering curricula, usually in the form of courses and/or laboratories. For reliable training ...
  • Bou Fayad, Anthony; Tekli, Joe (2018-11-05)
    The School of Engineering and the Artificial Intelligence (AI) Club are organizing a session titled: “Computer-Based Music Arrangement”
  • Mrad, Mona; Ramadan, Zahy; Nasr, Lina Issam (2023-06-13)
    Purpose The purpose of this study is to identify the key components pertaining and governing a Computer-Generated Influencer’s (CGI’s) identity and explores and analyzes the ensuing relationship between the CGI and its ...
  • Baba, Nabil (Lebanese American University, 2011-10-20)
    The number of internet web applications is rapidly increasing in a variety of fields and not much work has been done for ensuring their quality, especially after modification. Modifying any part of a web application may ...
  • Kouatli, Issam (IEEE, 2017-11-09)
    Autonomous vehicles are mainly based on sensory devices to be able to take decisions. Some linguistic terms we use as human beings cannot be well understood by machines without implementation of some type of intelligence. ...
  • Saab, Samer S.; Mhanna, Wassim; Saliba, Samir (2019-08-02)
    This paper examines the possibility for using RFID technology as a complete stand-alone vehicle positioning system. The concept is based on the vehicle carrying an RFID reader, which reads RFID tags installed on the side ...
  • Abu-Khzam, Faisal N.; Mouawi, Rana H. (2018-04-26)
    The enormous amount of data to be represented using large graphs exceeds in some cases the resources of a conventional computer. Edges in particular can take up a considerable amount of memory as compared to the number of ...
  • Haraty, Ramzi; Perrizo, William; Hakimzadeh, Hossein; Panda, B. (2017-02-02)
    Much attention is being directed toward the development of secure database systems, which are critical for both military and sensitive commercial applications. Most research in security and multilevel secure database ...