Distributed WiFi Availability Monitoring sponsored by KSU-UITS - First place in Graduate
Capstone Project in CCSE C-day!
Background: Wireless has become an critical IT service, however the ability of providers
to monitor the service has not matured at the same rate. The emergence of low cost
wireless devices has created an opportunity for building a system that aggregates
data from a large number of distributed data collectors.
Problem Statement: While it is easy to monitor the devices that provide the wireless
service, it is difficult to determine the user experience.
Objectives: Develop a low cost and scalable solution that monitors the campus WiFi
network from an end-user's perspective and collects information and statistics that
can be used to form a picture of the end user experience on our WiFi network.
Intelligent Extraction: Finding Needle in a Haystack sponsored by ADP
Competitor's data or New logo data is often found as an unstructured text file. Extracting
information from unstructured text and converting them into useful structured format
is close to finding needle in a haystack. Several Natural Language Processes have
been proposed and tested in the literature to perform unstructured document classification.
However, deriving one or bunch of algorithms for our use case will be a good problem
to solve, especially for students who seek to get to know the real world problems.
In this project, we would like the students to develop a process that will:
1) Be able to parse and extract payroll related information from unstructured text
2) Convert the original unstructured data into structured one;
3) Automatically verify the information in the converted structured dataset match
the original data source.
Impact of External Social Factors on Corporate Security Breaches sponsored by Home
The goal of this project is to find out if there is a relationship between a company's
external activities (Political or Social), the company's internal activities (business
process/purpose), and their chances of being breached. Breaking down various company
profiles and their external exposure, students would create a correlation model to
see what factors, if any, increase or decrease the likelihood of cyber attacks and
then build a predictive model to test the hypothesis.
When to buy Airline Tickets sponsored by Home Depot
The goal of this project is to find the best time to buy an airline ticket. Airline
ticket prices vary depending on how soon the flight is. Using attributes of a specific
flight such as airline, departure date, return date, trip duration, departure city,
arrival city, flight distance, etc. try to predict the optimal date to purchase a
ticket. For instance, it is generally true that the farther in advance you buy a ticket
the cheaper it will be. However, this is a very simple heuristic which may not be
true. In this project you will try to determine the relationship between purchase
date, flight date, and flight cost. Additionally, you will try to build a predictive
model so that a user can choose a specific flight and be given an optimal date to
purchase the ticket.
Expert Collaboration with IT faculty Dr. Meng Han on Project - Modern Disaster Analysis
Applications of Social Media sponsored by LexisNexis
The aim of this project is to bring together diverse research communities such as
information retrieval, data mining and machine learning, natural language processing,
computer vision, computational social science, and human computer interaction, to
potentially contribute towards building AI-based next-generation Information Processing
Systems for an effective utilization of social media data for disaster response and
Suggest (Guess) Dishes for Restaurant Customers sponsored by qMenu Inc.
The goal of this project is to find creative ways to engage customers, based on your
intensive data analysis of the online ordering data for qMenu. For example, your research
can be finding/suggesting customer' s favorite dishes. Self-driven is the key to be
successful for this position, but we have PhDs and economics experts in house to help
at anytime. At the later stage, YOU or a company engineer can help turning your ideas
Interactive Visualization of Food Insecurity sponsored by ICAT (icat.kennesaw.edu)
The project is to advance an interactive web-based tool that allows a user to click
on a country to get information about its policy strengths and weaknesses from the
perspective of a social market economy. The user can then simulate policy changes
and see how this policy change changes the economic growth trajectory. Results will
be presented through visualizations. Data sets will be prepared by the client.
Parking Maintenance Portal sponsored by Georgia Tech Parking and Transportation
Brief description: Web portal for maintaining parking space and maintenance information.
Background: Maintaining all information about 13,000 spaces and lots and decks can
Problem Statement: A lot of information is through word of mouth, email, or phone
calls. Often issues or tasks are forgotten and aren't tracked.
- touchscreen friendly interface to include mobile devices (ie. tablets and smart
- 2D overview / map of individual lots and individual levels of parking decks
- upon touching an area on the display, a popup will appear
- the popup will display a form
- the form will have drop down selections to categorize issues
- the form will have text fields for entering detailed information
- the form will be dynamic (ie. the remainder of the form will change depending upon
what is selected in the first few dropdowns)
- the form will be linked to a database
- selected users will be emailed upon creation relative to the category
- additional portal for entering data only
Multi-Factor Authentication Analysis sponsored by Georgia Technology Authority
In this project, the student will conduct an analysis on the application of multi-factor
authentication on business organizations and government institutions. The tasks of
this project includes:
1) understand MFA and it's pros/cons;
2) Research the MFA legislation;
3) Research the applications of MFA in government agencies;
4) create a implementation plan for an MFA solution in a mid-size business organization.
5) Present the findings to GTA Executive leadership.
Contact Relationship Management (CRM) sponsored by US Department of State
The US Department of State has encountered challenges with user acceptance, data quality
and performance in its existing disparate (and thus largely incompatible) mailing
list systems. Many of the existing systems are outdated or don't fully meet the needs
of US Embassies and Missions. An IT service (CRM - Contact Relationship Management)
has been implemented to address those challenges. It provides a central repository
for all posts and domestic offices to store their contacts, and is actively being
developed and improved by the Department itself, and thus has the potential to provide
a more agile way to address the individual and collective needs of the different offices.
Many offices have inquired as to just how much more useful the new system is, so we
will attempt to compare experiences and prior systems to the new system. We will assess
CRMs shortcomings based on the pros and cons of the old systems and compare to user
experiences with CRM
Case study on newly implemented IT Service
This Project aims to conduct a case study on the effectiveness of the newly implemented
IT service in Business Intelligence department using the principles of ITIL framework.
The case study will cover the whole life cycle of the IT service from service strategy,
service design, service transition, service operation, and continual service management.
In particular, this study will focus on the impact of the service before and after
the implementation, success factors of implementation, and lessons learned.