.

Browsing School of Arts and Sciences by Title

LAUR Repository

Browsing School of Arts and Sciences by Title

Sort by: Order: Results:

  • Kadi, Randa El (Lebanese American University, 2010-10-05)
    The terrorist attacks of September 11, 2001, and the consequent ‘war on terror’ and the American and British invasion and occupation of Iraq, has magnified the threat posed by Muslim immigrant communities residing in Europe. ...
  • El Kadi, Randa (Lebanese American University, 2011-10-27)
    The terrorist attacks of September 11, 2001, and the consequent 'war on terror' and the American and British invasion and occupation of Iraq, has magnified the threat posed by Muslim immigrant communities residing in ...
  • Bleik, Said M. (Lebanese American University, 2011-05-12)
    Today's technologies have an economic and cultural impact on industries and businesses as well as on consumers. Tasks are being automated and data is being organized in standard formats. In other words, the evolution of ...
  • Bou Hassan, Hadi (Lebanese American University, 2013-10-28)
    Research about students’ understanding of energy in physics has revealed that students have ideas about the physical world that are different from those accepted in the scientific community. Nowadays, the effect of the ...
  • Noureddine, Rasha A. (2021-05-05)
    Globally, educational institutes of all levels face challenges in equitable education delivery due to the global Coronavirus (COVID-19) pandemic forcing institutions online. A particular entity in the establishment of ...
  • Abu-Khzam, Faisal N.; Langston, Micheal A. (Springer, 2017-03-21)
    The relationship between graph coloring and the immersion order is considered. Vertex connectivity, edge connectivity and related issues are explored. These lead to the conjecture that, if G requires at least t colors, ...
  • Mansour, N.; Ponnusamy, R.; Choudhary, A.; Fox, G. C. (2016-01-25)
    Mapping data to parallel computers aims at minimizing the execution time of the associated application. However, it can take an unacceptable amount of time in comparison with the execution time of the application if the ...
  • Mansour, Nashat; Ponnusamy, A.; Choudhary, A.; Fox, G. C. (ACM, 2018-05-24)
    Mapping data to parallel computers aims at minimizing the execution time of the associated application. However, it can take an unacceptable amount of time in comparison with the execution time of the application if the ...
  • Makhoul, Racha (Lebanese American University, 2022-12-21)
    The current escalation in usage and complexity of modern digital systems, and the emergence of Very-Large Scale Integration (VLSI) has led to a huge design productivity gap in the chip design industry. It is well established ...
  • Al-Ayoubi, Nadine B. (Lebanese American University, 2011-09-23)
    For most of the last five decades, the United States has relied on the autocratic leaders of Egypt, Saudi Arabia and other Arab countries to help protect its vital interests in the neighborhood. However, on the morning of ...
  • El-Kassar, A. N.; Habre, S. S.; Awad, Y. A. (2016-12-08)
    Let T be a set of n distinct positive integers, x1, x2, ..., xn. The n×n matrix [T] having (xi , xj), the greatest common divisor of xi and xj , as its (i,j)-entry is called the greatest common divisor (GCD) matrix ...
  • Mazloum, Leila (Lebanese American University, 2018-10-16)
    Greece has recorded a peak level of its debts and budget deficits, which are considered to be the highest among the other European Union (EU) member states, making it the main focus of the debt crisis in the region. In ...
  • Abu-Khzam, Faisal N.; Langston, Micheal A. (ACM, 2018-04-24)
  • King, Gretchen; Albinati, Chris; Khoo, Anabel; Mooers, Candace; Tuinstra Harrison, Jacky (University of Toronto Press, 2023-02-28)
  • Mansour, Nashat; Faour, Ahmad; Shehab, Maya (IEEE Xplore, 2018-05-18)
    A Network Intrusion Detection System (NIDS) monitors all network actions and generates alarms when it detects suspicious attempts. We present a data mining technique to assist network administrators to analyze and reduce ...
  • Shehab, Maya (Lebanese American University, 2011-09-30)
    A Network Intrusion Detection System (NIDS) is an alarm system for networks. NIDS monitors all inbound and outbound network actions and generates alarms when it detects suspicious or malicious attempts. A false positive ...
  • Haddad, Haytham; Mroueh, Mohamad; Faour, Wissam H.; Daher, Costantine (2015-10-23)
    Introduction: Impairments in neuroendocrine regulation of food intake and postprandial satiety are leading causes to obesity. Ghrelin peptide is a GI hormone known to increase food intake partly through induction of growth ...
  • Nelson, Geoffrey (Lebanese American University, 2016-12-09)
    At the onset of the Syrian civil conflict in early 2011, the Republic of Lebanon Found itself again in a precarious position. Two actors have risen to importance, The Abdullah Azzam Brigades (AAB) and Sheikh Ahmed Assir ...
  • Beydoun, Joumana Bashir (Lebanese American University, 2012-07-10)
  • Ahmarani, Lena Pierre (Lebanese American University, 2011-10-26)
    GSTP 1 and NQO 1 gene polymorphisms were considered to be risk indicators of tobacco induced lung cancer. GSTP 1 gene expresses a detoxifying enzyme and its polymorphism leads to a change in the amino acid IIe to Val at ...

Search LAUR


Advanced Search

Browse

My Account