Project Portfolio
Throughout my academic career at CSUSM, I have been fortunate enough to work alongside some great, like-minded individuals on various projects with a focus in management information systems.
- Railway Database Management System - Our railway database system has been designed to provide real-time data, enabling effective decision-making processes and delivering a seamless experience for our customers. The database will contain data reflecting real-world scenarios, focusing on maintaining passenger records, transactions, reservations, tickets, and more. We will be able to retrieve information, including reports, that provide specific reservation status and ticket data. By analyzing historical data, such as the number of transactions, reservations, passengers, and performance reports, we can predict future trends and track productivity. Our database will create a competitive advantage by minimizing data redundancies, increasing data security, improving efficiency, reducing data storage and retrieval costs, ensuring data integrity, and improving data access. Immediate access to data supporting understanding and analyzing business performance will provide a long-term competitive edge.
- Vending Machine Project using Java - This vending machine program allows users to interact with a virtual vending machine. The program begins by prompting the user to insert $1 or $5 bills for payment. It then displays a menu of available items with corresponding prices. The user can select an item by inputting the corresponding number or choose to end the program by entering 0. Upon selecting an item, the program checks the user's input, displays the chosen item's name and price, and updates the balance and item price accordingly. It then calculates and displays the change to be returned to the user. The program handles invalid selections or insufficient funds by displaying appropriate messages. After each purchase, the user has the option to continue making additional purchases or end the program. The vending machine class manages the balance, change, and inventory, providing methods to update and display these values. In summary, this program simulates a vending machine where users can select and purchase items, pay with bills, and receive change if necessary.
- XRP Ledger Recycling Incentivization Program - Developed a recycling incentivization program by leveraging RippleScript, blockchain technologies, and smart contracts. The solution prompted long term sustainability as well as a clear way of verifying transparent and auditable data while also facilitating community engagement. Organized and led technical workshops across San Diego County, demonstrating the advantages of XRPL and blockchain technologies to over 200 local enthusiasts.
- Web 3.0 InfoSec Threats and Use Cases Research - For this project, we analyzed the underlying threats that Web 3.0 presents to how we view and access data. We started by examining Distributed Ledger Technologies (DLTs) and the solutions they offer, such as decentralized identity, secure and low-cost payment solutions, publicly verifiable logs of data with native consensus timestamps, and the sustainability aspect of Web 3.0. We then compared layer 1 and layer 2 blockchains like Ethereum, Polygon, Hedera, and Binance, considering their capabilities such as TPS (Transactions per second), scalability, security, governance model, consensus mechanism, regulatory compliance, developer tools and community support, and adoption of the ecosystem.
- Cloud Migration for Enterprise Application - Designed and implemented a cloud migration project leveraging AWS with tasks focusing on architecture design, infrastructure assessment, cost optimization, and security. Reduced infrastructure costs by optimizing resource allocation and incorporated enhanced security controls.
- Web Development Project, Random Reviews - Our project, Random Reviews, focused on creating a dynamic website resembling a blog where we publish reviews on a wide variety of products and services we come across in our daily lives, utilizing Python, HTML, CSS, and Oracle SQL. Unlike traditional platforms that concentrate on a single niche or popular subjects, we aimed to embrace the thrill of reviewing anything that captures our interest. Alongside our own reviews, we provided a platform for other users to contribute their own thoughts and engage in discussions. The primary objective of our project was to cater to our local community by establishing an interactive space where community members can actively participate and share their opinions on local services, facilities, and other aspects that matter to them. By encouraging user-generated content, we aimed to enhance local awareness and foster connections among individuals, ultimately strengthening the sense of community in our area.
- Prompt Engineering of GPT-Based Large Language Models - Comprehensive research paper on prompt engineering methodologies for optimizing human-AI interactions, with a specific focus on ChatGPT. The paper explores diverse techniques, including prompting with examples, System 1 and System 2 questions, emotion-driven prompts, prompt programming, and prompt patterns. The evaluation results highlight the strengths and considerations of each methodology, emphasizing their impact on precision, adaptability, versatility, and user engagement.
- Cloud Computing Presentation and Research - Throughout this project, we focused on the information security aspect within Cloud Computing and compared the advantages to the disadvantages. Furthermore, we conducted research on cloud infrastructure, software, and services through AWS Cloud and Microsoft Azure, as well as their respective competitors. Lastly, we examined how these solutions can provide businesses of any size with advantages when working with cloud computing and storage, compared to on-premises IT infrastructure.
- Multi-AS Network Simulation in Cisco Packet Tracer - Designed and implemented a complex enterprise network topology with multiple Autonomous Systems (AS), including routing protocols EIGRP, RIP, and BGP, to ensure efficient and secure communication between diverse network segments.
- Exploring Deep Learning for Image Classification: A Project in Handwritten Digit Recognition - Developed and trained a neural network for handwritten Arabic numeral recognition, offering classic and convolutional architectures with user-customizable parameters. Achieved 71% accuracy on the MNIST dataset, demonstrating proficiency in applying deep learning techniques for image classification.
- Cisco Packet Tracer Local Area Network (LAN) Design - Built a simulated Local Area Network (LAN) in Cisco Packet Tracer, leveraging both bus and star topologies for flexibility and scalability. Incorporated a Wireless LAN (WLAN) for mobile device access and configured Virtual LANs (VLANs) to segment network traffic and enhance security. Assigned IP addresses to devices and ensured proper communication across the hybrid network, demonstrating proficiency in network design and implementation.
- Secure Remote Access Infrastructure on AWS - Implemented a multi-factor authentication (MFA) solution for remote access, requiring users to verify their identity through additional factors beyond a password, significantly reducing the risk of unauthorized access. Created a logically isolated environment within the AWS cloud using a VPC. Further secured the network by utilizing Security Groups to control traffic flow and IAM to enforce least privilege access for remote users, minimizing the potential impact of security breaches. Enabled continuous monitoring and threat detection by integrating AWS CloudTrail for logging API calls and AWS GuardDuty for identifying potential security threats within the AWS environment.
- Automated Disaster Recovery on AWS - Minimized downtime and data loss for critical applications, including EC2 instances and Amazon databases, by creating a comprehensive DR plan on AWS. Established automated backups to S3 for EC2 instances and configured continuous data replication for Amazon databases, ensuring fast recovery in case of outages and 99.9% data availability. Documented failover procedures for swift restoration of EC2 instances and Amazon databases, minimizing disruption to business operations.
- E-Commerce Customer with AWS - Implemented data transformation and aggregation using AWS Glue and Amazon Athena to preprocess raw data from Amazon S3, facilitating efficient querying and analysis of customer behavior patterns. Employed Amazon Kinesis Data Streams to capture real-time customer interactions, stored data securely in Amazon S3, and utilized Amazon QuickSight for advanced analytics and visualization, enabling data-driven business decisions and targeted marketing strategies. Designed and automated scheduled reports and dashboards in Amazon QuickSight to provide stakeholders with timely insights into customer segmentation, purchasing trends, and campaign effectiveness, supporting strategic decision- making and business growth initiatives.
- Sales Performance Analysis and Forecasting - Leveraged Python libraries such as Pandas, NumPy, and Matplotlib to analyze historical sales data, identify trends, and develop predictive models for forecasting future sales. Created interactive visualizations using tools like Matplotlib and Seaborn to effectively communicate insights and support data-driven decision-making processes. Utilized machine learning techniques such as linear regression or time series analysis in Python (using libraries like Scikit-Learn or Statsmodels) to build and validate predictive models, improving accuracy in sales forecasting and strategic planning by 15%.
- Customer Age and Income Analysis - Analyzed the relationship between customer age and income using Python, leveraging statistical methods to derive actionable insights for targeted marketing strategies. Conducted data preprocessing tasks such as handling missing values and scaling features to ensure the accuracy and reliability of age and income analysis.
- Advanced Password Strength Checker - Developed a robust password strength checker that evaluates password length, character variety, sequential patterns, and commonality using the rockyou.txt file, which contains over 14 million passwords.Integrated the Have I Been Pwned API to cross-check passwords against known data breaches, enhancing security by detecting compromised credentials. Integrated the API to cross-check passwords against known data breaches, using SHA-1 hashing to protect user credentials during the breach check process. Utilized the rockyou.txt file containing over 14 million common passwords to identify and flag vulnerable passwords, preventing the use of easily guessable credentials. Provided comprehensive feedback on password strength, offering users detailed analysis of detected patterns and an overall strength assessment to promote stronger password creation.
- Benchmarking Cryptographic Algorithms for Performance and Memory Usage - Benchmarked AES (Advanced Encryption Standard) with a 32-byte key, RSA (Rivest-Shamir-Adleman) with key sizes up to 16384 bits, and ECC (Elliptic Curve Cryptography) with the P-521 curve. Developed custom scripts using the PyCryptodome library to measure encryption/decryption times, key generation times, and memory usage, saving benchmark results for further analysis.