(C) = Capstone, (T) = Thesis

Capstone/Thesis Advisor: (Finished)


  1. Kunal Joshi, “Navigation System using Outdoor Object Detections & Recognitions for People who are Blind & Visually Impaired using Deep Learning.”
  2. Tulasi Amaraneni, “E-commerce Recommendation System.”
  3. Bharath Kumar Reddy Ralgari, “Implementing a Serverless Architecture for Data Analytics using AWS.”
  4. Trung Khuong, “IoT Statistic and Analytics of Networking Traffic Data on AWS IoT Cloud Core”.
  5. Sahil Shah, “Spotify Recommendation System and Analysis Dashboard form 1925-2021.”
  6. Dylan Dias, “Global Climate Change Dashboard.”
  7. Jonathan Pereira, “Anchor Self-Calibrating Schemes for UWB based Indoor Localization.”
  8. Ankit Jadhav, “Implementing Analytics to Evaluate Network System”.
  9. 2020

  10. Annesha Talukdar, “IoT Malware Detection and Analysis”.
  11. Athanasios Babsidis, “Information Systems Security Readiness Visualization Tool”.
  12. Kwame Compton, “Disaster Recovery Failover Environment Using AWS”.
  13. Neha Mittoor Changappa “An Integrated Social Media Analysis and Business Listing Platform for Marketing Cloud Agencies”.
  14. Gage LaFleur, “An Assessment Tool for Analysis of IoT Security in the Home”.
  15. William Crowe, ”Machine to Machine Ad Hoc Networking with a Redundant 4G LTE Gateway”.
  16. 2019

  17. Krishan Teja Patchamatia, “Attacks on IoT Deveices”.
  18. Sindhura Meka, “ERP for Small Business.”
  19. Annesah Basude Talukdar, “IoT Malware Detection and Analysis.”
  20. Manu Suresh, “Dynamic Sensor Orientation Unit for Intelligent Mobility Cane.”
  21. Steve Forney, “User Experience in Sign Language Recognition.”
  22. Shreya Thacker, “Application for Borrower’s Credit Capacity.”
  23. Poorveen Tailor,”Enterprise Network Solution using Aruba Products.”
  24. 2018

  25. Bharat Biyani,“Configuration, Evaluation and Performance Testing of First Hop Network Redundancy Protocols.”
  26. Shriyan Mithun, “Improving Autonomous System Security for BGP Networks.”
  27. Saravana Murugesh Kumar, “Building a Distributed Data Processing Server with Hazard Detection for a Real-Time Package Monitoring System.”
  28. Li Liu, “WebRTC Real-Time Communication and Synchronous Whiteboard of the Web”.
  29. Ravi Theja Lingam, “Achieving High Availability Networks Using VRRP”.
  30. Venkata Sai Saaketh Nistala, “Mitigation Techniques for Layer 2 and 3 Attacks”.
  31. Ankit Mujumdar, “Smart Home Evaluation with IoT Devices.”
  32. Harold Chelchowski, “Increasing Cybersecurity Awareness via a Windows Web Security Application”.
  33. 2017

  34. Ashish Heda, “Developing IoT Labs using Wireless Sensor Networks.”
  35. Adrian Pinder, “Hashed QR Codes for a Cost Effective Automated Motor Vehicle Licensing System.”
  36. Mohammed Alsaimi, “An Efficient IP Lookup Mechanism for Classless Inter-Domain Routing Using Radix-Trie.”
  37. 2016

  38. Kevin Yip : Utiliing Splunk Across An IT Enterprise Operations.
  39. Osama AlQahtani, Improving Network Security for Jazan University.
  40. Rebecca Gibbon, Performance Testing for Physical and Cloud File Servers at Rochester Institute of Technology.
  41. Khalid Jarrah, Merging Wireless Sensor Networks in Lab Practice.
  42. Haward Rodriguez, Policy System Administration in IP Networks: A Global Correlation Problem.
  43. Alexander Rodriguez, Assessing Performance on DO ccTLD Name Servers.
  44. Suyash Jadhav, Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning.
  45. 2015

  46. Khalid Almatrafi, Studying the Effects of Using an Electronic Learning Management System on the Royal Saudi Naval Forces Network using OPNET Technology.
  47. Haitham Alghmdi, Design & Performance Evaluation of SDL network connected to IPS in Saudi Arabia via OPNET tools.
  48. Naif AlAslani, Cloud and Student Information Records:Design & Evaluate the performance for national institute of technology (NIT) in Saudi Arabia by Opnet Tool.
  49. Khaled Algarni, Information Security Policy for e-Government in Saudi Arabia (effectiveness-vulnerabilities-threats).
  50. Kriti Sharma, Designing a course-Enterprise Mobile.
  51. Sahil Bhola, Evaluation of Mobile Device Security Policies.
  52. Seung Kim, Dell KACE client deployjment:end-to-end system.
  53. 2014

  54. Abdulaziz Alshuwaier, Evaluation of Firewall Effects on Cloud Computing Performance.
  55. Ameen Almoqhim, Improving Performance of Multi-Segment Transport Protocol and Sensor Transmission Control Protocol.
  56. Almogari Mshari, Performance Comparison between OLSR & AODV using the System in-the Loop(SITL) Simulation from OPNET.
  57. Trad Albalawi, Addressing Saudi SMEÕs Cloud Security Issues.
  58. Eid Abdulaziz, Redesigning & Expanding the IPA Optial Intranet Using OPNET SP Guru Transport Planner.
  59. Aamir Khalid A Ahmadhussain, Smart Home for Deaf by using iPhone Application with Bluetooth & Wireless Network
  60. Sullman, Alotaibi, Managing & Securing Personal Devices-Auditing ChecklistsSecure Design & Implementation of Videoconference Networking for the Royal Saudi Navy Force (RSNF)
  61. Rainer Campillo, A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network.
  62. Juan Salcedo,
  63. Bhavin Desai, ISTA Test Selection Tool Network Modeling & Analysis Labs Using Opnet.
  64. Ishita Metha, Modeling & Simulation Las of Manet Using OPNET.
  65. 2013

  66. Amit Umarye, Proactive Resource Monitoring.
  67. Rajath Chouta, Controlled Environmental Study of a Standalone Computer Incorporating Arrhenius’ Equations.
  68. Mohammad Zamzami, Cloud based eHR system: Design and analyze the performance using OPNET tool for the kingdom of Saudi Arabia.
  69. , Malviya, Esha, Monitoring System Website Design.
  70. John Gustafson, Comparing Application Latency Using Virtualized and Non-Virtualized Network Architectures.
  71. Nancy, Sinan, mplementing SHA-1 and ECDSA in Vehicular Ad-Hoc Network using NS-3.I
  72. Algarni, Abdullah, Parental Control Application for Multi-User on Android Platforms.
  73. Raman, Vivek, Real-time Package Monitoring System using RFID and GPS Technologies.
  74. 2012

  75. . Alharbi, T., Emergency Communication for Deaf and Hard of Hearing.
  76. Jafferi, J., Implementation of Security Encryption and comparing Performance evaluation of Ad Hoc On Demand Distance Vector and Dynamic Source Routing Protocols using OPNET.
  77. Alharbi, T., An Assistive Communication Device for the Deaf and Hard of Hearing in the event of Emergency Evacuations.
  78. Alghamdi, K.,Bluetooth Security Lock for Android Smart Phone Platform.
  79. Sun, Y. , A Smartphone Application of Emergency Siren Detection for Vehicle Drivers with Hearing Disabilities..
  80. Madhavan, S., WiMax Communications for Neighbor Area Networks.
  81. Thummala, K., Performance of Storage Technologies: A Comparison Study.
  82. 2011

  83. Patil, M., Effect of Real Video Streaming over Virtual MANET Environment
  84. Alenizi, A., Emergency Communication for Deaf/Hard of Hearing.

Capstone/Thesis Committee Member: (Finished)


  1. Rajashruthi Rajashekar (C), “Correlation Between Tweet Clusters and Cultural Hotspots in New York State”.
  2. Shreya Thacker (C) “Application of Borrower’s Credit Capacity”.
  3. Ralph Thelusma (C), “Understanding Contributing Factors to Poor Alphanumeric Password Safeguarding Practices”
  4. Sarah Andrew (C), “Designing for Mobile Authentication Situational Impairments Caused by COVID-19 Preventions”.
  5. Sreecharan Vangala (C), “Movie Recommendation System using Machine Learning Techniques.”
  6. 2020

  7. Palak Kurani (C), “Sentiment Classification of Smartphone Review by Considering Two Sides of Each Review”.
  8. Nikhil Nair (C), “Traffic Violation Analysis for Assessment of Insurance Risk Pools.”
  9. 2019

  10. Nikhil Nair (C), “Traffic Violation Analysis for Assessment of Insurance Risk Pools.”
  11. 2017

  12. Sindhura Meka (C), “ERP for Small Businesses.”
  13. Abdualziz Aliohani (C), “Increasing Cloud Availability and Integrity with an Onsite, Lightweight, Temporary Infrastructure and Database Replication.”
  14. Mithun Shriyan (C), “Improving Autonomous Systems Security for BGP Networks.”
  15. Jahed Iqbal (C), “Evaluate MDM Monioring and Applied Security”.
  16. 2016

  17. Pedro Montero (C): Gpon Implementation & Deployment Case Study Flaws of Implementation & Deployment, Tricom Dominican Republic.
  18. Mohammed Alghanemi (C): BPCS Student E-Service.
  19. Martin Okelo (C): Open Source Adoption in Eastern Africa.
  20. Jonathan Waggoner (C): Android Metasploit Module Proposal.
  21. Luis Alberto Pena, Committee Member (C): Detection System for VoIP toll frauds.
  22. 2015

  23. Mia Foster (C): How Effective for Impleenting Locked Down IT Environment to Secure the Business.
  24. Mostafa Alaqsm (C): The benefits of implementing RLES in Jazan University.
  25. Jeremy Schiefer (C): Using AWS as a Second Site.
  26. Marwan Alkhoder (C): Development of a blood donation network application.
  27. Saeed Alghamdi (C): Oneline Evaluation App for Planning and Development.
  28. Chirag Bharat Shah (C): System Operations Engineering Dashboard.
  29. 2014

  30. Assis Ngolo (C): Federated Identity Management in e-Government.
  31. Rini Raj Pulari (C): Deploy and Manage WMWare VCloud.
  32. Pooriva Aghaalitari (C): Development of a Vitrualization Systems Architecture Course for the Information Sciences and Technologies Dept.
  33. Aamir Ahmadhussian (C): Smart Home for Deaf People by Using iPhone Application with Bluetooth and Wireless Networks.
  34. 2013

  35. Carlos Gonzalez, Committee Member (C): Teaching System Administration in Amazon’s Elastic Cloud Computing Service.
  36. 2011

  37. Dautov, R. (C): Efficient Collision Resolution Protocol for Highly Populated Wireless Networks.
  38. Coleman, K. (C): A Low Cost Accountability, Communications, and Management System for Emergency First Responders using 3G and 4G Cellular Technologies.
  39. 2010

  40. Caminiti, J. (C): Service Level Agreements and Virtual Machine.