student

Infra Project 2025

SisuCTF Hack. Defend. Conquer. Active Directory capture-the-flag competition for hackers.

Museum3D - Dive inside water filled cave. A 3D game for museum, using real 3D maps created by divers.

JES Automated Plant Watering and Monitoring System. RoomTracr Track room occupancy and environmental conditions. ÄJAK Never forget your keys. AIMLOps Improvements to MLOps platform.

2025 projects completed.

Log Anomaly Detection With Artificial Intelligence

 Can artificial intelligence pick suspicious log entries? My students Tuomo Kuure and Joni Hakala are training a model for that.

They use ELK to collect logs from multiple computers to an ElasticSearch NoSQL database. These log entries are then analysed with their own model using Python Tensorflow in a Docker container with GPU support.