CI Computer Science students were successful in submitting three papers to KES 2019, the 23rd International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, which this year is taking place in Budapest, Hungary, in September 2019. The papers are the following:
Approximating consistency in pairwise comparisons, co-authored by Chris Kuske, Konrad Kułakowski and Michael Soltys. Chris Kuske was a masters student in Computer Science at CI, and this paper is the result of his masters thesis [pdf], which was co-supervised by Prof. Konrad Kułakowski (AGH), who at the time was a Kościuszko Scholar in Computer Science at CI. Chris Kuske is a Software Lead at Teledyne Controls where he develops avionics software for commercial aircrafts. (This paper will be presented in the Invited Session IS18: Decision modeling with and without pairwise comparisons.)
SEAKER: A mobile digital forensics triage device, co-authored by Eric Gentry and Michael Soltys. Eric Gentry was a masters student in Computer Science at CI, and currently working at GBL Systems, and lecturing for Computer Science at CI. This paper is the result of a collaboration between Computer Science at CI and the SoCal High Technology Task Force. For more details on this collaboration please see here. (This paper will be presented in the Invited Session IS13: Cybercrime Investigation and Digital Forensics.)
Deploying Health Campaign Strategies to Defend Against Social Engineering Threats, co-authored by Noelle Abe and Michael Soltys. Noelle Abe is a senior student at CI, who just graduated this May with a degree in Computer Science. Noelle Abe was both a President’s Scholar at CI, and the vice-president of the Computer Science Girls Club. This paper was initiated by Noelle as part of her research as an exchange student in the UK in 2017. (This paper will be presented in the Invited Sessions IS24: Knowledge-based Learning and Education Support System: Design and Function.)
Joel Helling is a Software Engineer at GBL Systems Corporation and part-time lecturer at CSUCI. He started working at GBL Systems, a government contractor based in Camarillo, in 2014 working on various projects from automated website design, implementation, and testing to desktop application development. Currently, he develops Test and Evaluation tools for the Test Resource Management Center (TRMC) and supports the development of the Testing and Training Enabling Architecture (TENA) Software Development Activity (SDA) including maintaining and updating legacy applications, and designing and implementing new software tools.
Joel completed his Master’s in Computer Science in 2018. His Master’s Thesis, under the advisement of Dr. Soltys, discussed the intersection of stringology and graph theory by relating indeterminate strings with undirected graphs and proving some properties of the indeterminate string and its associated alphabet size. The paper was later published in the Journal of Theoretical Computer Science. Currently, Joel is also working as a part-time lecturer for CSUCI. See here for details.
My student Geetanjali (Geet) Agarwal defended her masters thesis titled Aneka – Wavelet Image Hashing Algorithm, see announcement, where the contribution is a framework of hashing algorithms for image recognition. This important work is done in collaboration with the SoCal High Technology Task Force (HTTF). Geet deployed the AWS to accomplish her results, including EC2 instances and MySQL databases used to run experiments on thousands of images. Geet’s thesis will be available after the final draft is ready.
It was a pleasure to speak at the AWS/CSU Research in the Cloud series. By nature I am not a strong promoter of any technology, and the browser, OS or editor “wars” frankly bore me; I sometimes use a “lesser” technology because it happens to be more convenient, or because I don’t have the time to learn a “better” technology, or many other good reasons.
However, as a researcher and teacher I am absolutely thrilled with what AWS has to offer. I regularly give tours of our computer labs at CSU CI (to local companies, prospective graduate students, CSU trustees, fundraising prospects, etc.), and I explain that three things make it possible for a relatively small and unknown campus like ours to compete in scientific & engineering output in the national and international arena:
How cheap embedded systems have become; a Google Raspberry Pi is $35, and it comes with Linux and GPIO that makes it into a universal controller.
How cheap 3D printing has become, and in turn this frees us to some extent from having to build an expensive manufacturing lab.
And AWS: Amazon Cloud Computing Services. Instead of buying, maintaining, cooling and powering expensive servers, we can immediately utilize the required services, and pay as we go. This works very well for a university because we do not have to make up-front capital investments, and our usage is not always the same (e.g., practically no classes in the summer).
As I am working through the AWS Academy Cloud Computing Architecture – Instructor Accreditation, we are going to offer COMP 529, our Cloud Computing course in the Computer Science masters program, using the AWS curriculum. This is a service offered through the AWS Academy. The students who complete the course will be ready to take the AWS Cloud Solutions Architect certification.
The first lecture will be on Thursday January 24, 2019, in Sierra Hall 1131 (the Computer Science Networking & Security Lab).
Zane Gittins is a Systems Security Engineer at Haas Automation and recently graduated from CSUCI with a bachelors in Computer Science. Zane started his journey at Haas as an intern through CSUCI partnerships with local business and was recently hired full time. During his undergraduate career he worked under Dr. Pilarcyzk as an assistant in research focused on Persistent Homology. During his capstone project he worked closely with Dr. Soltys to provide a security best practices document to Haas. He continues to expand his education in the CI masters of Computer Science program (MSCS).
Understanding “industry best practices” involves a simple process of distilling expectations for both cybersecurity and privacy requirements. This process is all part of identifying reasonable expectations that are “right-sized” for an organization, since every organization has unique requirements. It can be best to visualize “best practices” as a buffet of cybersecurity and privacy controls, where you select what is applicable to your organization, based on statutory, regulatory and contractual obligations.