Founded by Hiam Sakr of Ain Ebel, Lebanon, the American University of Science and Technology, in Beirut, Lebanon, an educational institute, was established on 21 March 1994 under the name of AUC , as an external degree program with the State University of New York/Empire State College, New York, USA. It later changed its name to American University of Science and Technology. On the March 7, 2000, it became a private non-sectarian co-educational institution of higher learning licensed by Presidential Decree no. 3585. Because of its title, the American University of Beirut , the first and oldest American university in Lebanon, filed lawsuit against the institute forcing it to change its name to "American University College of Science and Technology". In 7 August 2007 the College title was removed and the university was renamed The American University of Science and Technology by a governmental decree. Its medium of instruction are English and French. AUST offers both Undergraduate and Graduate courses and degrees in most of its departments. Wikipedia.
Fayad F.,American University of Science and Technology |
Hamadeh K.,USA Carry
2012 11th International Conference on Information Science, Signal Processing and their Applications, ISSPA 2012 | Year: 2012
Due to the increased interest in multiple-objects tracking, various methods have been recently proposed and applied in different applications such as: pedestrians identification and tracking, road vehicles detection and tracking, airplanes classification and tracking, etc. However, in presence of inter-object occlusion and sensor gaps, most of these methods result in tracking failure due to object-to-track association failure. This paper presents a new algorithm on object-to-track association in multi-sensor fusion systems under the transferable belief model framework. The proposed approach quantifies the belief on associating each detected object to each existing track, and takes into consideration the creation of new tracks by the non-associated objects. © 2012 IEEE.
El-Halabi M.,American University of Science and Technology |
Achkar R.,American University of Science and Technology
2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2015 | Year: 2015
Perfect security for the multi-antenna wiretap channel is considered, at the physical layer, under a limited-energy constraint. The problem was originally considered in  for point-to-point channels, where the fundamental limits of secure communication have been established in the wideband regime. In this paper, the more general multi-antenna scenario is addressed. The main result proves that the secrecy capacity per unit cost (energy), under the mild condition of zero-cost input letter, can be achieved using a structured orthogonal random binning coding scheme. © 2015 IEEE.
Owayjan M.,American University of Science and Technology |
Kashour A.,American University of Science and Technology |
Al Haddad N.,American University of Science and Technology |
Fadel M.,American University of Science and Technology |
Al Souki G.,American University of Science and Technology
2012 2nd International Conference on Advances in Computational Tools for Engineering Applications, ACTEA 2012 | Year: 2012
Detecting lies is crucial in many areas, such as airport security, police investigations, counter-terrorism, etc. One technique to detect lies is through the identification of facial micro-expressions, which are brief, involuntary expressions shown on the face of humans when they are trying to conceal or repress emotions. Manual measurement of micro-expressions is hard labor, time consuming, and inaccurate. This paper presents the Design and Development of a Lie Detection System using Facial Micro-Expressions. It is an automated vision system designed and implemented using LabVIEW. An Embedded Vision System (EVS) is used to capture the subject's interview. Then, a LabVIEW program converts the video into series of frames and processes the frames, each at a time, in four consecutive stages. The first two stages deal with color conversion and filtering. The third stage applies geometric-based dynamic templates on each frame to specify key features of the facial structure. The fourth stage extracts the needed measurements in order to detect facial micro-expressions to determine whether the subject is lying or not. Testing results show that this system can be used for interpreting eight facial expressions: happiness, sadness, joy, anger, fear, surprise, disgust, and contempt, and detecting facial micro-expressions. It extracts accurate output that can be employed in other fields of studies such as psychological assessment. The results indicate high precision that allows future development of applications that respond to spontaneous facial expressions in real time. © 2012 IEEE.
Barbar A.,American University of Science and Technology |
Ismail A.,Lebanese University
ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings | Year: 2015
A major realm of security breach for today's users is unprivileged access, modification or sometimes forgery of critical business, or user information. Existing computer locking/unoking methods serve as an intermediate barrier against unethical deeds. The proposed solution BlueKey is a software-based solution installed on Personal Computers (PC) that safely unlocks the PC by securing the Bluetooth communication channel between the user's mobile device and his/her PC. BlueKey helps end-users in not typing their passwords every time they need to access their PCs. At the same level, this solution includes a mobile application that allows the owner to fully control his/her PC via Bluetooth, and runs a breach detector module with safety measures to protect the PC when it is locked. At the technical level, BlueKey is a platform free application written using Java programming language, fulfilling the Write Once Run Anywhere (WORA) concept. This system is built using Java Development Kit (JDK) and compiled using Java Virtual Machine (JVM), and runs with Java Runtime Environment (JRE). Alongside, the mobile application is developed using Java 2 Micro Edition (J2ME), which is compatible with Android, Symbian, and BlackBerry operating systems. Copyright © 2015 SCITEPRESS - Science and Technology Publications.
Abu-Faraj Z.O.,American University of Science and Technology
Conference proceedings : ... Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference | Year: 2010
Fall-related injuries, disabilities, and fatalities are known to seriously affect the healthcare and industry sectors. Nevertheless, an abled individual, as well as a trained senior citizen, is believed to be capable of withstanding and overcoming unusual environmental variations in terms of postural stability and balance. Understanding the biomechanics of fall and fall recovery through quantitative measurements could provide academic and methodical means to maintain human postural stability, of various ages, in such environments. This study assesses human performance and endurance in the most hazardous environment of a simulated violent seismic activity of a magnitude of 6.5 degrees on the Richter's scale. The objective is to evaluate fall and fall recovery in young abled adults using dynamic plantar pressure measurements. The obtained results support the hypothesis that falls in young adults could be prevented via exercise intervention programs. Further investigation is done by our research group to validate the same concept for senior citizens.
Haidar G.A.,American University of Science and Technology |
Boustany C.,American University of Science and Technology
Proceedings - 2015 9th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2015 | Year: 2015
Computer networks threats are becoming one the most widely debated issues worldwide. Various types of attacks are generated periodically and in an increasing scale alarming and threatening networking security issues. This is leading tone serious and fast development of feasible techniques for developing effective Intrusion Detection Systems (IDS's). In this context, some of the widely used and tested IDS's are discussed. Anomaly-based network intrusion detection techniques are getting the attention in most of the networking fields to protect network systems against malicious acts, providing a good security level especially with the integration of neural networks in the detection systems which provided advanced methods of threats investigation and detection. This paper emphasizes the importance of anomaly-based intrusion detection techniques, the important outcomes of these systems, latest developed methods and what is expected from the future experiments in this field. Moreover, the technique of learning user profiles effects in detecting intrusions will be discussed. Finally, the lights will be shed on an offline approach using Multi Layer Perceptron (MLP) and Self Organizing Maps(SOM) which is a distinguished method in intrusion detection. © 2015 IEEE.
Abu-Faraj Z.O.,American University of Science and Technology
Middle East Conference on Biomedical Engineering, MECBME | Year: 2014
This paper is an empirical study that aims to characterize the similarities/differences among existing biomedical engineering curricula in the Middle East and North Africa (MENA). The work is based on an earlier study entitled 'Project Alexander the Great' that identifies 29 institutions of higher learning within this region, offering degree programs or options in Biomedical Engineering. The objective is to evaluate the curricula of the identified institutions as to their adherence to three major curriculum philosophies: i) VaNTH-ERC (Vanderbilt-Northwestern-Texas-Harvard/MIT Engineering Research Center) Education Mission for Bioengineering and Educational Technologies, ii) Whitaker Curriculum Philosophy, and iii) Accreditation Board for Engineering and Technology Curriculum Philosophy-ABET EC2000. The obtained results reveal that these programs are, to a certain degree, compliant with the requirements of the abovementioned philosophies. As such, the MENA region is witnessing a healthy academic growth and interest in the Biomedical Engineering field. The paper concludes with a referral to a different study by Abu-Faraj that provides a collection of recommendations and strategies to be implemented by entities which are planning to introduce state-of-the-art curricula in this vital field within the MENA region. © 2014 IEEE.
Zakhour R.,American University of Science and Technology |
Hanly S.V.,Macquarie University
IEEE Journal on Selected Areas in Communications | Year: 2013
This paper considers base station (BS) cooperation in the form of coordinated beamforming, focusing on min-max fairness in the power usage subject to target SINR constraints at each single-antenna user. We show that the optimal beamforming strategies have an interesting nested zero-forcing structure. In the asymptotic regime where the number of antennas at each BS and that of users in each cell both grow large with their ratio tending to a finite constant, the dimensionality of the optimization problem that needs to be solved is greatly reduced, and only knowledge of statistics is required to solve it. The optimal solution is characterized in general, and an algorithm is proposed that converges to the optimal transmit parameters, for feasible SINR targets. For the two cell case, a simple single parameter characterization is obtained. These asymptotic results provide insights into the average performance, as well as simple but efficient beamforming strategies for the finite system case. In particular, the asymptotically optimal beamformers only require the BSs to have local instantaneous channel state information; the remaining parameters of the beamformers can be calculated using channel statistics, thereby reducing the channel state information estimation and signaling overhead. © 2012 IEEE.
Goldberg N.,Jacksonville University |
Reiss K.C.,American University of Science and Technology
Wetlands | Year: 2016
The realization of wetland ‘no net loss’ policy under Section 404 of the Clean Water Act remains uncertain, as mitigation practices force a trade-off in on-site mitigation with loss of biological integrity and off-site mitigation with a redistribution of ecosystem services. Wetlands cover 25 % of the Lower St. Johns River Basin (LSJRB), northeastern Florida, a region impacted by urban development. This case study investigated whether impacted wetland area and type of mitigation differ with land use intensity among the years 2006–2013 from a review of 522 Environmental Resource Permits. A Landscape Development Intensity index was used to compare land use as a function of anthropogenic activity for permitted parcels and mitigation banks. Forested wetlands comprised 47–97 % of impacted wetland area/yr and the majority of parcels and mitigation banks were in mid to high development areas (75 % of area). On-site only mitigation (29 % of permits) and use of mitigation banks (27 %) were more common than off-site only mitigation (20 %). Wetland preservation (880 ha/yr) was more common than wetland creation (9 ha/yr). This study puts into question the ‘no net loss’ wetland policy as urban development contributes to cumulative loss, fragmentation, and re-organization of wetlands across the landscape despite compulsory mitigation. © 2016 Society of Wetland Scientists
Saide C.,University of Technology of Troyes |
Lengelle R.,University of Technology of Troyes |
Honeine P.,University of Technology of Troyes |
Achkar R.,American University of Science and Technology
IEEE Signal Processing Letters | Year: 2013
Nonlinear system identification has always been a challenging problem. The use of kernel methods to solve such problems becomes more prevalent. However, the complexity of these methods increases with time which makes them unsuitable for online identification. This drawback can be solved with the introduction of the coherence criterion. Furthermore, dictionary adaptation using a stochastic gradient method proved its efficiency. Mostly, all approaches are used to identify Single Output models which form a particular case of real problems. In this letter we investigate online kernel adaptive algorithms to identify Multiple Inputs Multiple Outputs model as well as the possibility of dictionary adaptation for such models. © 1994-2012 IEEE.