American University of Science and Technology

www.aust.edu.lb
Beirut, Lebanon

Founded by Hiam Sakr of Ain Ebel, Lebanon, the American University of Science and Technology, in Beirut, Lebanon, an educational institute, was established on 21 March 1994 under the name of AUC , as an external degree program with the State University of New York/Empire State College, New York, USA. It later changed its name to American University of Science and Technology. On the March 7, 2000, it became a private non-sectarian co-educational institution of higher learning licensed by Presidential Decree no. 3585. Because of its title, the American University of Beirut , the first and oldest American university in Lebanon, filed lawsuit against the institute forcing it to change its name to "American University College of Science and Technology". In 7 August 2007 the College title was removed and the university was renamed The American University of Science and Technology by a governmental decree. Its medium of instruction are English and French. AUST offers both Undergraduate and Graduate courses and degrees in most of its departments. Wikipedia.


Time filter

Source Type

Tannous G.,Complutense University of Madrid | Barbar A.M.,American University of Science and Technology
2016 IEEE International Multidisciplinary Conference on Engineering Technology, IMCET 2016 | Year: 2016

Over a decade ago, online social networks have emerged in people's lives. They have provided people with the tools to share information with their friends and families and took advantage of the data they have collected. Nowadays, more users are on the online social networks and many of them neglect their personal privacy and security. Many studies tried to influence those users and show them how vulnerable they were by approaching this issue from multiple sides such as connections, locations, images and text. In this solution, we try another perspective by introducing a fuzzy logic system whose role is to classify users into a vulnerability level based on the information they share and their recurrence. The fuzzy logic system implemented based on the Mamdani's technique is able to classify a given user's vulnerability and to show which areas of the shared information have led to the given conclusion. The provided solution still has many areas that can be improved such as building a crawler to collect information directly from the web accounts of the users and applying to the extracted data big data analytics techniques. Also, another area can be tackled and that is proving that users' vulnerability can be correlated. © 2016 IEEE.


Raheel S.,American University of Science and Technology
2016 IEEE International Multidisciplinary Conference on Engineering Technology, IMCET 2016 | Year: 2016

nowadays, we witness an abundancy in mobile applications and a richness in their functionality. However, many of them were developed with insufficient attention when it comes to usability and user friendliness. As such, we may find one application's interface clogged with controls that hamper the user from using it properly or another's interface designed without taking care of universal usability. The result is that the user experience with different applications goes from being a total satisfaction to a total frustration. Very good care should be taken while designing mobile applications since the mobile phone are constrained with a limited screen size and a few interaction mechanisms. Adaptive User Interfaces (AUIs) were proposed in order to levitate the negative impact of these constraints and, as such, help improve the application's usability. In this paper, we propose a number of intelligent adaptive mechanisms capable of monitoring the user's behavior on a mobile phone and then adapting the interface accordingly. Our proposed mechanisms yield significant usability benefits and make the user's experience with this application more satisfying. © 2016 IEEE.


Aoudi W.,Chalmers University of Technology | Barbar A.M.,American University of Science and Technology
2016 IEEE International Multidisciplinary Conference on Engineering Technology, IMCET 2016 | Year: 2016

One of the main tasks sought after with machine learning is classification. Support vector machines are one of the widely used machine learning algorithms for data classification. SVMs are by default binary classifiers, extending them to multi-class classifiers is a challenging on-going research problem. In this paper, we propose a new approach to constructing the multi-class classification function, where the structure and properties of the support vectors are exploited without altering the training procedure. Our contribution is based on the insight that one is not restricted to using the hyperplane-based decision function, resulting from the mathematical optimization problem. The proposed classification procedure considers the notion of distance between vectors in feature space. We show how, under the assumption of a normalized kernel, the distance between two vectors in feature space can be expressed solely in terms of their inner product. We apply both the original and proposed methods on synthetic datasets in a simulation setting, and then we argue that the proposed distance-based method represents a more rigorous and intuitive measure than the traditional hyperplane-based method. © 2016 IEEE.


Fayad F.,American University of Science and Technology | Hamadeh K.,USA Carry
2012 11th International Conference on Information Science, Signal Processing and their Applications, ISSPA 2012 | Year: 2012

Due to the increased interest in multiple-objects tracking, various methods have been recently proposed and applied in different applications such as: pedestrians identification and tracking, road vehicles detection and tracking, airplanes classification and tracking, etc. However, in presence of inter-object occlusion and sensor gaps, most of these methods result in tracking failure due to object-to-track association failure. This paper presents a new algorithm on object-to-track association in multi-sensor fusion systems under the transferable belief model framework. The proposed approach quantifies the belief on associating each detected object to each existing track, and takes into consideration the creation of new tracks by the non-associated objects. © 2012 IEEE.


El-Halabi M.,American University of Science and Technology | Achkar R.,American University of Science and Technology
2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015 | Year: 2015

Perfect security for the multi-antenna wiretap channel is considered, at the physical layer, under a limited-energy constraint. The problem was originally considered in [1] for point-to-point channels, where the fundamental limits of secure communication have been established in the wideband regime. In this paper, the more general multi-antenna scenario is addressed. The main result proves that the secrecy capacity per unit cost (energy), under the mild condition of zero-cost input letter, can be achieved using a structured orthogonal random binning coding scheme. © 2015 IEEE.


Haidar G.A.,American University of Science and Technology | Boustany C.,American University of Science and Technology
Proceedings - 2015 9th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2015 | Year: 2015

Computer networks threats are becoming one the most widely debated issues worldwide. Various types of attacks are generated periodically and in an increasing scale alarming and threatening networking security issues. This is leading tone serious and fast development of feasible techniques for developing effective Intrusion Detection Systems (IDS's). In this context, some of the widely used and tested IDS's are discussed. Anomaly-based network intrusion detection techniques are getting the attention in most of the networking fields to protect network systems against malicious acts, providing a good security level especially with the integration of neural networks in the detection systems which provided advanced methods of threats investigation and detection. This paper emphasizes the importance of anomaly-based intrusion detection techniques, the important outcomes of these systems, latest developed methods and what is expected from the future experiments in this field. Moreover, the technique of learning user profiles effects in detecting intrusions will be discussed. Finally, the lights will be shed on an offline approach using Multi Layer Perceptron (MLP) and Self Organizing Maps(SOM) which is a distinguished method in intrusion detection. © 2015 IEEE.


Abu-Faraj Z.O.,American University of Science and Technology
Middle East Conference on Biomedical Engineering, MECBME | Year: 2014

This paper is an empirical study that aims to characterize the similarities/differences among existing biomedical engineering curricula in the Middle East and North Africa (MENA). The work is based on an earlier study entitled 'Project Alexander the Great' that identifies 29 institutions of higher learning within this region, offering degree programs or options in Biomedical Engineering. The objective is to evaluate the curricula of the identified institutions as to their adherence to three major curriculum philosophies: i) VaNTH-ERC (Vanderbilt-Northwestern-Texas-Harvard/MIT Engineering Research Center) Education Mission for Bioengineering and Educational Technologies, ii) Whitaker Curriculum Philosophy, and iii) Accreditation Board for Engineering and Technology Curriculum Philosophy-ABET EC2000. The obtained results reveal that these programs are, to a certain degree, compliant with the requirements of the abovementioned philosophies. As such, the MENA region is witnessing a healthy academic growth and interest in the Biomedical Engineering field. The paper concludes with a referral to a different study by Abu-Faraj that provides a collection of recommendations and strategies to be implemented by entities which are planning to introduce state-of-the-art curricula in this vital field within the MENA region. © 2014 IEEE.


Zakhour R.,American University of Science and Technology | Hanly S.V.,Macquarie University
IEEE Journal on Selected Areas in Communications | Year: 2013

This paper considers base station (BS) cooperation in the form of coordinated beamforming, focusing on min-max fairness in the power usage subject to target SINR constraints at each single-antenna user. We show that the optimal beamforming strategies have an interesting nested zero-forcing structure. In the asymptotic regime where the number of antennas at each BS and that of users in each cell both grow large with their ratio tending to a finite constant, the dimensionality of the optimization problem that needs to be solved is greatly reduced, and only knowledge of statistics is required to solve it. The optimal solution is characterized in general, and an algorithm is proposed that converges to the optimal transmit parameters, for feasible SINR targets. For the two cell case, a simple single parameter characterization is obtained. These asymptotic results provide insights into the average performance, as well as simple but efficient beamforming strategies for the finite system case. In particular, the asymptotically optimal beamformers only require the BSs to have local instantaneous channel state information; the remaining parameters of the beamformers can be calculated using channel statistics, thereby reducing the channel state information estimation and signaling overhead. © 2012 IEEE.


Goldberg N.,Jacksonville University | Reiss K.C.,American University of Science and Technology
Wetlands | Year: 2016

The realization of wetland ‘no net loss’ policy under Section 404 of the Clean Water Act remains uncertain, as mitigation practices force a trade-off in on-site mitigation with loss of biological integrity and off-site mitigation with a redistribution of ecosystem services. Wetlands cover 25 % of the Lower St. Johns River Basin (LSJRB), northeastern Florida, a region impacted by urban development. This case study investigated whether impacted wetland area and type of mitigation differ with land use intensity among the years 2006–2013 from a review of 522 Environmental Resource Permits. A Landscape Development Intensity index was used to compare land use as a function of anthropogenic activity for permitted parcels and mitigation banks. Forested wetlands comprised 47–97 % of impacted wetland area/yr and the majority of parcels and mitigation banks were in mid to high development areas (75 % of area). On-site only mitigation (29 % of permits) and use of mitigation banks (27 %) were more common than off-site only mitigation (20 %). Wetland preservation (880 ha/yr) was more common than wetland creation (9 ha/yr). This study puts into question the ‘no net loss’ wetland policy as urban development contributes to cumulative loss, fragmentation, and re-organization of wetlands across the landscape despite compulsory mitigation. © 2016 Society of Wetland Scientists


Saide C.,University of Technology of Troyes | Lengelle R.,University of Technology of Troyes | Honeine P.,University of Technology of Troyes | Achkar R.,American University of Science and Technology
IEEE Signal Processing Letters | Year: 2013

Nonlinear system identification has always been a challenging problem. The use of kernel methods to solve such problems becomes more prevalent. However, the complexity of these methods increases with time which makes them unsuitable for online identification. This drawback can be solved with the introduction of the coherence criterion. Furthermore, dictionary adaptation using a stochastic gradient method proved its efficiency. Mostly, all approaches are used to identify Single Output models which form a particular case of real problems. In this letter we investigate online kernel adaptive algorithms to identify Multiple Inputs Multiple Outputs model as well as the possibility of dictionary adaptation for such models. © 1994-2012 IEEE.

Loading American University of Science and Technology collaborators
Loading American University of Science and Technology collaborators