Narrow your search

Library

ULiège (3)


Resource type

dissertation (3)


Language

English (3)


Year
From To Submit

2024 (1)

2022 (1)

2020 (1)

Listing 1 - 3 of 3
Sort by

Dissertation
Master thesis : How Kubernetes can support cloud native application development ?
Authors: --- --- --- ---
Year: 2020 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

The development of applications has evolved. Several years ago, the trend was to create some monolithic applications on a mainframe. Now, it is the micro-services architecture in the cloud. The requirements of the users have also changed. They want a secured application highly available at any time. These constraints transform the IT sector and the application development. The workflow must be quick and automatised.

Kubernetes is a potential solution to support the development of cloud native application. This master thesis will explore how it can be used to create an environment to fit the new constraints. It begins by the creation of a cluster of 6 instances in the cloud (3 masters and 3 workers) and the development of a web application to represent a real use case. After that, a comparison is made between some tools dedicated to the continuous integration and deployment. It is the basis of the devOps and gitOps principles which ensure an efficient workflow. The communication between the services is performed by Istio which is a service mesh tool. It is responsible of the routing and the enforcement of policy rules. A micro-services architecture has some weaknesses in term of security at the level of the cluster itself, the Kubernetes API, the images used by the container, the running containers and the services. All these elements can be configured to mitigate or reduce the consequences of an attack. The performances of Kubernetes and the added tools are analysed to determine in which cases Kubernetes is interesting. In the majority of the cases, it is a efficient choice if the application receives a variable load and must be highly available and secured. The conclusion and the future works close this master thesis.


Dissertation
Towards a new benchmark for background subtraction algorithms in computer vision
Authors: --- --- ---
Year: 2024 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

Background subtraction is the initial step in many computer vision applications. As such, choosing the most appropriate algorithm for a given task is crucial as it can significantly impact the performance of the entire system. However, the selection process is often challenging due to the large amount of available algorithms, and the lack of standardised benchmarks. Traditionally, researchers and industry professionals have relied on paper surveys and tools like ChangeDetection.net (CDNet) to identify potential algorithms. This thesis attempts at addressing these limitations by proposing a novel Background Subtraction Recommender Platform, a scalable, extendable, and modular web-based system that adapts to the user's input to recommend the most suitable algorithms for his needs, abstracting away the complexity of the selection process. The main goal of the application is to provide a contextualised ranking of the algorithms, and to streamline the algorithm development process by allowing the submission and execution of new algorithms while providing insights on their performances. To do so, this solution leverages state-of-the-art algorithm evaluation procedures. Additionally, contextualisation of the recommendation process is guided by semantic segmentation algorithms to put emphasis on the content of the video sequences. The ranking system is evaluated for a set of algorithms obtained from the BGSLibrary on real-world data built upon the well-known CDNet dataset, demonstrating its ability to provide meaningful recommendations to the user.


Dissertation
Master thesis : Distributed Logging Transport for Unreliable and Lossy Networks
Authors: --- --- --- ---
Year: 2022 Publisher: Liège Université de Liège (ULiège)

Loading...
Export citation

Choose an application

Bookmark

Abstract

Message logging is the tool of choice to stay informed about the health of a machine or application. These messages, called logs, are used for various purposes, including system management, performance optimization, investigation of suspicious activities, and more generally analysis and debugging. Operations that demand a level of reliability at least equivalent to the emphasis placed on them during their use. However, the syslog protocol was originally designed to work exclusively over UDP. Traditional applications, which have not benefited from the a postorio additions such as TCP, are forced to communicate over a network that is not suitable for them (corrupted or lost messages, reordering, or unreachable server) and over which they have no control. The objective of this work is to develop a resilient syslog relay that will operate downstream of applications, collect their syslog messages and send them to a central syslog server. Several mechanisms such as the use of the TCP protocol and the retention of messages in case of connection loss guarantee reliability. Topics related to message ordering and strategies in case of an overload are also discussed and several approaches are presented to either mitigate or regulate their impact. The implementation, in the form of a prototype, is deployed inside a router running the Cisco IOx environment and features the modern syslog message engine, rsyslog. The model is evaluated on the basis of its functionality and performance in a test environment with network quality such as 3G cellular and EDGE. Several configurations are proposed depending on the type of usage involved. Although the solution does not cover all possible and imaginable problems, such as router outages, the evaluations demonstrate the efficiency and scalability of the proposed solution, which can for example easily handle several tens of thousands of messages per second with a very low resource footprint.

Listing 1 - 3 of 3
Sort by