School of Technology and Computing
Applied Research Symposium
Spring 2023

Hosted by CityU’s Center for Cybersecurity Innovation and School of Technology and Computing (STC), the Applied Research Symposium is open to faculty, professionals, and students from any discipline, university, or professional organization.  At the end of each quarter, any students who would like to share their projects including capstone courses will present their outcomes. This symposium will provide opportunities for students, researchers, and practitioners to discuss the influence and impact of the applied computing on the future of our planet and our society

Event details

Date: Thursday,June 08th, 2023
Time: 4:30PM-5:30PM PST
Contact:Raeiszadehanahita@cityuniversity.edu

Advisors

DR. Sam Chung
Professor, School of Technology
& Computing
(CY 685)
DR. Brian Maeng
Associate Professor, School of Technology & Computing (DS 687 & DIT 699)
Greg Surber
Associate Professor, School of Technology & Computing (CY 665)
Dr. Ali Khamesipour
Assistant Professor, School of Technology & Computing
(CS 687 )
DARRON JOHNSON
Assistant Professor, School of Technology & Computing (CS 497)

Session Chairs

 Teaching Assistants
Anahita Raeis Zadeh

Anahita Raeiszadeh

                        Yared Shewarade

                       Shravya Nangineni

                            Serkan Hiziroglu

                       Anna Kriuchkova

Presenters

Alumni

veerendra-e1643094767927-pjitrm5z2gtfx649lgbcta61j8xo20y7v083mapajk

Name : Veerendra Jagatha

Course: CS 687

Cross-Platform App Development: A Comparative Study of PWAs and React Native Mobile Apps

Description: This research aims to compare the architecture, performance, and user experience of Progressive Web Apps (PWAs) and React Native mobile apps by converting a web application to both platforms using React framework. The study evaluates the challenges faced and modifications made during the conversion process and aims to provide developers with insights into the best approach for a specific use case.

MicrosoftTeams-image (3)

Name: Alekhya Malla

Course: CS 687

Automating Descriptive Response Analysis using BERT language model

Description: This project involves utilizing BERT’s capabilities to process and understand natural language text and generate descriptive insights based on the given descriptive responses. BERT (Bidirectional Encoder Representations from Transformers) is a state-of-the-art language model developed by Google that excels at various natural language processing (NLP) tasks.

Internship at eFulgent

Course: CS 680

Description:  Deploying a scalable and reliable real-time application for monitoring, log analytics, and website search using AWS

clementk

Name: Clément Karumuhinzi

Course: CY665

Spam and Malicious URLs Detection Using Machine Learning

Description: The purpose of this research is to propose a prototype web application to detect spam and malicious URLs in real time using Machine Learning.

IMG_2386 (1)

Name: Deepti Venkatesh

Course: CS 497

Modern Consent Management and Data Sovereignty

Description: By leveraging digital wallets and verifiable credentials, individuals can create a personal data wallet that enables seamless, consent driven data usage. This approach may be able to foster a balanced relationship between businesses and users, eliminating the need for confusing pop-up consent pages or tabs, and potentially reducing consent fatigue. I’ll be creating a web demo of what could be done. There are some assumptions this demo will make, and some parts of the demo will not be coded due to knowledge limits and time constraints.

IMG_1523

Name : Andre Idlebird

Course: CS 497

IoT In Healthcare: The Digital Angels

Description: The Internet of Things (IoT) has the potential to improve patient outcomes and help hospitals with nursing shortages. This technology can also be used to remotely monitor patients, minimizing the need for in-person care and allowing nurses to focus on more important activities. IoT can assist ease the strain on healthcare personnel in institutions with nurse shortages by automating regular operations, such as monitoring vital signs, and delivering notifications when action is required. 

IMG_7029 2

Name : Kristine Harris

Course: CS 687

AWS Cloud Advantages for the Federal Aviation Administration

Description: Presenting on the advantages of how the FAA could greatly benefit from using more cloud based technologies. 

image0

Name : Ranjit Das

Course: CS 687

Application Security Solution using Keycloak

Description: The purpose of this research paper is to show how an Open-source Identity and Access management (IAM) tool called Keycloak streamlines the authentication process for Codyssey Web Nepal application. Due to the nature of the Codyssey application, it needs a reliable application security tool to safeguard it against unauthorized access and data manipulation as well as a strong system to control client identities. This research paper will also cover the Keycloak capabilities that will enable a high-quality IAM system for application without having to develop complex software solutions, which can be expensive and time-consuming.

aaaaaa

Name : Luis Linares Medina

Course: CS 687

Backend Legacy Data Migration to Cloud Platform

Description: The legacy of data migration is an important activity that helps to transform the architectural styles applied during a system’s design with the result of modernizing the system. With the constantly growing volume of data in the context of cloud applications deployed in geographically distributed systems, the issue of data management has turned to be an essential study to evaluate the performance of the cloud system.

Mahathi-scaled-pjith3d0k8evybei1ekpefra4ysqw06e2xbf7say74

Name : Mahathi Vucha

Course: CS 687

Text Detection using Image Processing

Description: The research introduces a two-step process for detecting and identifying text in intricate images. It combines a text localization stage for speed and size normalization with a machine learning text verification step based on background-independent features.

shelby-e1649808580442-pna35ijregfdcu4zzfndjyunixwfyagkr1v7vgrcf4

Name : Shelby Lynch

Course: CS497

Time Series Analysis of Tree Distribution

Description: Project discusses using time series analysis to understand how climate and other factors affect tree distributions over time.

profl

Name : Fernando Mckenzie Gooden

Course:  CS497

Exploring The Benefits of The Onion Router, Tails OS, and The Significance of Information Freedom

Description: The relevance of free speech and privacy on the internet will be explored through a case study of the Tails operating system and the Onion Router (TOR). The first section of the examination will discuss free expression and the importance of unrestricted access to information. In the second section, we’ll learn about Tails OS and how it can help you maintain your anonymity while using the internet. The examination will also emphasize the significance of recognizing and avoiding the security dangers associated with utilizing Tails OS. To accomplish this, a communication strategy to increase public awareness and backup plans for connectivity (such the use of virtual private networks) will need to be developed. In the end, the research will focus on what end users need to know about protecting their privacy and security while running Tails OS with TOR.

Headshot

Name : Shingo Kise

Course: CS680

Internship at One Code Club

Description: Front-end projects that I got to work on during my internship

Profile Photo

Name : Yin Yin Tan

Course: DS 687

An Artificial Intelligence Approach to Predicting Heart Disease in the United States

Description: Using AI/ML to predict heart disease, a leading cause of death for U.S. population 

ARS

Name : Dare Fatade

Course: CS 687

Application Deployment in Cloud Computing

Description: The paper talks about introduction to AWS cloud and its benefits, followed by a discussion of the various deployment options available on the platform, including EC2 instances, Elastic Beanstalk, and Lambda functions. The paper also covers key considerations when deploying applications to AWS cloud, including security, scalability, and cost optimization.

vinithraPic1 (2)

Name : Vinithra Sankaran

Course: CS 687

Amazon EKS Deployment with Terraform and GitLab CI/CD

Description: This project utilizes GitLab’s review-apps to automate the deployment of Amazon EKS (Elastic Kubernetes Service) clusters using Terraform.  The paper also covers the best practices and implementation of GitLab’s continuous integration and continuous deployment pipelines.

pictureII

Name : Ian McGeoy

Course: CS 497

Information Consolidation Using Web Scraping With Go and Python

Description: Programming an RSS reader with the ability to create and display non-RSS sources. Programmed with Go back end and Python front end.

christopher-prfcusk6xndpdkgipofb3pgjgbbevckc3vm945nlwg

Name : Christopher Sharp

Course: CS 687

Accessibility in Computational Research in Physics and Astronomy

DescriptionComputation is a key part of modern scientific research in physics and astronomy. Two key bottlenecks in computational work are availability to resources and technical background to utilize resources. This paper seeks to address both facets. It shows how resource availability is problematic even in major collaborations and experiments, and contrasts that to lesser funding of smaller and disadvantaged schools to outline the framework of a possible solution using cloud computing resources. It also shows how software tools can better automate boilerplate features of scientific computing. It is hoped this may facilitate wider participation in physics and astronomy research by researchers especially at smaller, more disadvantaged schools.

pic

Name : Shubhashree Bhattacharya

Course: CS 687

Multi-Cluster Kubernetes API Gateway: An Open-Source Solution for Scalable Microservice Architectures

Description: While there are many cloud provider API gateways such as Amazon API Gateway, Azure API gateway etc. and open-source API gateways available in the market such as Kong, Ambassador, Tyk API gateways, they mostly lack in providing a free open-source multi-cluster hybrid API management where user applications are deployed in multiple cloud and on-premises environment. This project aims to research and implement an API gateway in the multi-cluster Kubernetes environment in which multiple Kubernetes clusters are deployed and managed by API gateway. When the system load is high, the gateway steers traffic for multiple applications and load balances traffic. It enforces authorization and authentication policies to enforce security. When a service reaches the limit, the API gateway automatically stops the service from sending an upstream request and implements rate limiting to the services from a centralized place. 

image001

Name : Marie Aimee Karumuhinzi

Course: DS 687

Using Artificial Intelligence to Uncover Critical Divorce Predictors

Description: The objective of this project is to use machine learning techniques to identify critical factors that lead to divorce.

Rima

Name : Rima Akileh

Course: CY665

DevSecOps - The unattainable Golden Standard

Description: This white paper will discuss the DevSecOps framework, why is it challenging to implement, and best practices

photo

Name : Bashar Abu-Hweij

Course: CS687

Identity and Access Management Solution for the LibreFoodPantry.org Project

This research examines the implementation of Keycloak Identity Access Management solution to secure the full stack of modern web applications, developed using MongoDB, Express, React, and Node technologies (MERN Stack), intended for use by the LibreFoodPantry.org community.

LibreFoodPantry.org is a free open-source framework, for schools and developers to contribute to projects related to food pantries.

The final solution provides an adaptable, high-quality, easy-to-build, and maintain, system for authenticating and authorizing users accessing food pantry web applications

Picture2

Name : Adrian Wilkinson

Course: CS687

On the Benefits of a Proposed Method of Quantifying Complexity Induction for the Purpose of Generating Feedback Loop Parameters

 Solving 2D recombinant challenges as quickly and as accurately as possible is well documented as a worthy goal.   This work investigates the possible benefits of assimilating a specific controlled complexity induction approach inside of a feedback loop for purpose of assisting in solving these type problems.    The well known TSP challenge was selected as the medium in which to perform this investigation.    A readily controllable complexity induction method was developed.   This control method was then aligned with a deterministic 2D TSP problem solution method:  more specifically, with a nested triangles derived convex hulls solver employing both shortest-distance merge and inner-to-outer layer consumption criteria.   Results show that when the subject complexity induction control method was woven into the aforementioned deterministic nested triangles solution method, the resultant reduced rigidity, learning based merge decisions do provide improved solutions.   Additionally, there was clear evidence of healing ability regarding non-validating cross-over features associated with the purely deterministic derived solutions.

Schedule

Contact Us

raeiszadehanahita@cityuniversity.edu