Hosted by CityU’s Center for Cybersecurity Innovation and School of Technology and Computing (STC), the Applied Research Symposium is open to faculty, professionals, and students from any discipline, university, or professional organization. At the end of each quarter, any students who would like to share their projects including capstone courses will present their outcomes. This symposium will provide opportunities for students, researchers, and practitioners to discuss the influence and impact of the applied computing on the future of our planet and our society
Description: This research aims to compare the architecture, performance, and user experience of Progressive Web Apps (PWAs) and React Native mobile apps by converting a web application to both platforms using React framework. The study evaluates the challenges faced and modifications made during the conversion process and aims to provide developers with insights into the best approach for a specific use case.
Description: This project involves utilizing BERT’s capabilities to process and understand natural language text and generate descriptive insights based on the given descriptive responses. BERT (Bidirectional Encoder Representations from Transformers) is a state-of-the-art language model developed by Google that excels at various natural language processing (NLP) tasks.
Description: Deploying a scalable and reliable real-time application for monitoring, log analytics, and website search using AWS
Description: The purpose of this research is to propose a prototype web application to detect spam and malicious URLs in real time using Machine Learning.
Description: By leveraging digital wallets and verifiable credentials, individuals can create a personal data wallet that enables seamless, consent driven data usage. This approach may be able to foster a balanced relationship between businesses and users, eliminating the need for confusing pop-up consent pages or tabs, and potentially reducing consent fatigue. I’ll be creating a web demo of what could be done. There are some assumptions this demo will make, and some parts of the demo will not be coded due to knowledge limits and time constraints.
Description: The Internet of Things (IoT) has the potential to improve patient outcomes and help hospitals with nursing shortages. This technology can also be used to remotely monitor patients, minimizing the need for in-person care and allowing nurses to focus on more important activities. IoT can assist ease the strain on healthcare personnel in institutions with nurse shortages by automating regular operations, such as monitoring vital signs, and delivering notifications when action is required.
Description: Presenting on the advantages of how the FAA could greatly benefit from using more cloud based technologies.
Description: The purpose of this research paper is to show how an Open-source Identity and Access management (IAM) tool called Keycloak streamlines the authentication process for Codyssey Web Nepal application. Due to the nature of the Codyssey application, it needs a reliable application security tool to safeguard it against unauthorized access and data manipulation as well as a strong system to control client identities. This research paper will also cover the Keycloak capabilities that will enable a high-quality IAM system for application without having to develop complex software solutions, which can be expensive and time-consuming.
Description: The legacy of data migration is an important activity that helps to transform the architectural styles applied during a system’s design with the result of modernizing the system. With the constantly growing volume of data in the context of cloud applications deployed in geographically distributed systems, the issue of data management has turned to be an essential study to evaluate the performance of the cloud system.
Description: The research introduces a two-step process for detecting and identifying text in intricate images. It combines a text localization stage for speed and size normalization with a machine learning text verification step based on background-independent features.
Description: Project discusses using time series analysis to understand how climate and other factors affect tree distributions over time.
Description: The relevance of free speech and privacy on the internet will be explored through a case study of the Tails operating system and the Onion Router (TOR). The first section of the examination will discuss free expression and the importance of unrestricted access to information. In the second section, we’ll learn about Tails OS and how it can help you maintain your anonymity while using the internet. The examination will also emphasize the significance of recognizing and avoiding the security dangers associated with utilizing Tails OS. To accomplish this, a communication strategy to increase public awareness and backup plans for connectivity (such the use of virtual private networks) will need to be developed. In the end, the research will focus on what end users need to know about protecting their privacy and security while running Tails OS with TOR.
Description: Front-end projects that I got to work on during my internship
Description: Using AI/ML to predict heart disease, a leading cause of death for U.S. population
Description: The paper talks about introduction to AWS cloud and its benefits, followed by a discussion of the various deployment options available on the platform, including EC2 instances, Elastic Beanstalk, and Lambda functions. The paper also covers key considerations when deploying applications to AWS cloud, including security, scalability, and cost optimization.
Description: This project utilizes GitLab’s review-apps to automate the deployment of Amazon EKS (Elastic Kubernetes Service) clusters using Terraform. The paper also covers the best practices and implementation of GitLab’s continuous integration and continuous deployment pipelines.
Description: Programming an RSS reader with the ability to create and display non-RSS sources. Programmed with Go back end and Python front end.
Description: Computation is a key part of modern scientific research in physics and astronomy. Two key bottlenecks in computational work are availability to resources and technical background to utilize resources. This paper seeks to address both facets. It shows how resource availability is problematic even in major collaborations and experiments, and contrasts that to lesser funding of smaller and disadvantaged schools to outline the framework of a possible solution using cloud computing resources. It also shows how software tools can better automate boilerplate features of scientific computing. It is hoped this may facilitate wider participation in physics and astronomy research by researchers especially at smaller, more disadvantaged schools.
Description: While there are many cloud provider API gateways such as Amazon API Gateway, Azure API gateway etc. and open-source API gateways available in the market such as Kong, Ambassador, Tyk API gateways, they mostly lack in providing a free open-source multi-cluster hybrid API management where user applications are deployed in multiple cloud and on-premises environment. This project aims to research and implement an API gateway in the multi-cluster Kubernetes environment in which multiple Kubernetes clusters are deployed and managed by API gateway. When the system load is high, the gateway steers traffic for multiple applications and load balances traffic. It enforces authorization and authentication policies to enforce security. When a service reaches the limit, the API gateway automatically stops the service from sending an upstream request and implements rate limiting to the services from a centralized place.
Description: The objective of this project is to use machine learning techniques to identify critical factors that lead to divorce.
Description: This white paper will discuss the DevSecOps framework, why is it challenging to implement, and best practices
This research examines the implementation of Keycloak Identity Access Management solution to secure the full stack of modern web applications, developed using MongoDB, Express, React, and Node technologies (MERN Stack), intended for use by the LibreFoodPantry.org community.
LibreFoodPantry.org is a free open-source framework, for schools and developers to contribute to projects related to food pantries.
The final solution provides an adaptable, high-quality, easy-to-build, and maintain, system for authenticating and authorizing users accessing food pantry web applications
Solving 2D recombinant challenges as quickly and as accurately as possible is well documented as a worthy goal. This work investigates the possible benefits of assimilating a specific controlled complexity induction approach inside of a feedback loop for purpose of assisting in solving these type problems. The well known TSP challenge was selected as the medium in which to perform this investigation. A readily controllable complexity induction method was developed. This control method was then aligned with a deterministic 2D TSP problem solution method: more specifically, with a nested triangles derived convex hulls solver employing both shortest-distance merge and inner-to-outer layer consumption criteria. Results show that when the subject complexity induction control method was woven into the aforementioned deterministic nested triangles solution method, the resultant reduced rigidity, learning based merge decisions do provide improved solutions. Additionally, there was clear evidence of healing ability regarding non-validating cross-over features associated with the purely deterministic derived solutions.
|4:30 PM – 4:35 PM|
Greeting & Announcement
Advisors: Dr. Sam Chung
Chair: Anahita Raeiszadeh
Teams link: Main
|4:35 PM – 4:55 PM|
Presenter 1: Veerendra Jagatha
Topic: Cross-Platform App Development: A Comparative Study of PWAs and React Native Mobile Apps
Chair: Veerendra Jagatha
Teams link: Session 01
Presentation: 15 Minutes
Q& A: 5 minutes
|4:55 PM – 5:15 PM|
Presenter 2: Clément Karumuhinzi
Topic: Spam and Malicious URLs Detection Using Machine Learning
|5:15 PM – 5:35 PM|
Presenter 3: Rima Akileh
Topic: DevSecOps – The unattainable Golden Standard