File | Description | Size | Format | |
---|---|---|---|---|
3.94 MB | Adobe PDF |
Download(s).
Haw katalog, note about this record, send a note about this record.
Your Message was sent successfully.
Couldn't send your message. Please contact the Support.
Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.
Predictive Monitoring in Process Mining is the discipline of predicting business processes according to the outcome or the remaining time. The relevant data source is an event log which includes all activity data regarding a process from an ERP system. Either an abstraction of the entire workflow is created for generative models, or individual traces for each entity are extracted for descriptive models.
Whereas much research has been completed in comparing quantitative results, I provide a qualitative overview of the most important literature in this field. The thesis further focuses on the technical implementation and parameters one could apply to create such procedures and prediction models. The purpose is to ensure a first level of understanding on the different realization methods of predictive process monitoring (PPM) and to understand how the authors conducted their research procedure.
As the following summary can not go into each technical detail, it will only revolve around the most comprehensive parts of my thesis . This summary will thus include an explanation about generative and descriptive models, including the pre-processing of transaction data necessary for descriptive models, as well as the integration of different information contexts. I will finally outline my findings.
Generative models produce a representation or abstraction of business processes that can be calculated from observations, i.e. past process transactions. These generative methods are process-aware in the predictive process monitoring context. They belong to the traditional statistics. From data, a world state is estimated that is finally taken as input in a decision theory to predict results.
Many generative models have been found in the PPM literature. Especially those approaches perform best that, firstly, put an emphasis on including activity data, which will be covered in the section about contextual information, and secondly, that can represent the control flow i.e., the process as accurately as possible. Generative models are of particular importance in research, as handling missing information is an overall problem in ERP production environments, and at the same time, a particular strength of generative approaches.
Introduction.
Discriminative models focus on the boundaries of decisions. Their goal is to predict the property of the data. In contrast to generative PPM methods, they all follow a comprehensive workflow structure: first process sequences are extracted and filtered, then, they must be bucketed, then these traces are encoded, and finally a model is applied that can work with the data. This can be explained as they belong to the modern machine learning techniques. These can directly predict results based on preprocessed data, without the detour of creating a comprehensive abstraction of the real world.
Trace bucketing is a procedure to divide traces with different methods. The resulting buckets serve as separate training sets for different models. Concerning the bucketing procedures, the simplest one is the so-called single bucket approach. It should be pursued if the initial training set is limited to the extent that the model could not be appropriately trained. Particularly, neural networks also do not require bucketing, as large amounts of data can be used for training. As another example, prefix length bucketing specialize a model for different points in time of process execution.
Sequence encoding is about treating traces as complex symbolic sequences, each carrying a data payload. The sequence encoding can be situated after trace bucketing, whereas the traces need to be encoded in machine readable language i.e., in structured data. In their simplest form, they are simple symbolic sequences which do not include activity attributes. In their more sophisticated form, they describe related data in a static or dynamic manner. Last state encoding, for example, only includes the attributes of the last event of a trace, ignoring the evolution to that point.
There is no comprehensive literature review that compares all possible combinations of trace bucketing and sequence encoding according to their performance. Nevertheless, it must be said that a holistic comparison of all different combinations can be quite an extensive task. Additionally, since encoding techniques do not exclude themselves, the significance of such a paper could be limited as combinations of multiple encoding techniques would also need to be included to gain a complete overview. Lastly, there is no universal solution as different models require different processing workflows.
Classifiers categorize data into distinct labels. As categorization problems are the most fundamental, they will serve as the basic building blocks for the more complex issues. Next event and outcome predictions necessitate classifiers and both revolve around the same method.
Regressors have the commonality to predict a continuous-valued output instead of one from a finite set, in contrast to classifiers. In PPM, regressors are applied to predict the remaining time.
Structured predictors output entire sequences as predictions i.e., remaining paths of a sequence in our case. Structured predictors only include Long Short-Term Memory (LSTM) models, according to the current state of research. LSTM models belong to the Recurrent Neural Networks that are used in contexts in which the input or output range of data is not known beforehand.
Admittedly, in the implementation, there are classifiers that can serve as either classifier or regressor and vice versa. Most advanced approaches use a combination of classification and regression, as well as descriptive and generative models. For other discriminative models besides LSTM, data preprocessing requires a greater effort because they must be adjusted to work with sequence information. Furthermore, neural networks are relevant for large datasets with high dimensions. In general, discriminative models seem to be performing better than generative ones.
To classify the scientific work on contextual factors as comprehensively as possible, a classification can be made based on the extent of information, whereby cause and effect get increasingly unclear the larger the scope becomes. Contextual information includes intra-case, inter-case, social, external, and spatial information to a process. At least one paper has been found for each aspect.
Intra-case contextual information is information captured in an activity itself. Selected attributes to an event include the vendor, the document type, and the item category which can all be incorporated into the event log. Including intra-case information is the common approach for descriptive models.
In contrast, inter-case features, or process context information, include dependencies between different activities. The idea behind it is that predictions are also dependent on the execution of events in the same period e.g., competing for the same resource in the process context. Generative models take advantage of these features.
Regarding the social context , these factors encompass the way humans and automated agents interact within a particular organization to execute process-related activities. Friction between individuals may delay process instance, and the speed at which people work may vary.
Furthermore, external context information, as the news, can be included. Regarding this example, the information includes the fields of both the social and the external context, as the external information like the economic climate is having an impact on the people’s sentiments, such as their level of stress.
The spatial context can be seen as middle child between process, social, and external context. One successful model has been achieved by including the locations of process traces.
Beyond the intra- and inter-case contextual information, the other specialized approaches have not yet been implemented in the larger scope of PPM papers. Thus, the social, external and spatial contexts necessitate further research. Among others, external contextual information like social media, blogs etc. could be evaluated. In addition, a spatio-temporal model could be applied to further increase the remaining time accuracy.
Predictive Process Monitoring, a forecasting business operation tool, can be situated between Process Mining, as a form of comprehending the current state of a process to undertake strategic measures, and Prescriptive Process Monitoring, that interprets the prediction so that measures are described to pilot a process outcome. The review consists of both generative and discriminative models; the latter can be further broken down into prefix bucketing and encoding, implementing a machine learning model, and deciding which information context to include in the design.
All papers, that were just part of a related field of study and not necessary to implement a prediction model, were excluded. The thesis is aimed at providing a counterbalance for other quantitative reviews in this field. A large variety of findings have emerged: both generative and descriptive models play a role in current research, there is a lack of papers in the field of process suffix prediction as well as structured predictors, and the integration of a larger information context, e.g., from external sources, should be an integral part of future research.
Process Mining
Our analytics platform for SAP data - smart, integrated, user-friendly
With dab Link we seamlessly integrate analytic results with your SAP system.
Perform data analytics from a portfolio of around 300 questions at the push of a button.
The ultimate SAP data analytics solution using Microsoft Fabric for seamless integration and advanced insights.
“Working at dab means working with professional and talented individuals who make great friends. ”
Daniela (Teamlead Marketing)
Challenges and Potentials of Process Mining - Bachelor Thesis
May 15, 2020
Philipp Kiencke
Global Partner Manager
As most of you know, dab: Daten – Analysen & Beratung GmbH is a spin-off from the Deggendorf Institute of Technology (THD). We have therefore always had working students who work for us and sometimes also write their final thesis with us.
Mathias Kirsch, for example, wrote his bachelor’s thesis last year on the topic of ‘Challenges and potentials of process mining’. This thesis sheds light on the topic of process mining on a scientific basis. Among other things, the methods, challenges and limitations, the potential of process mining and the degree of maturity of various algorithms are analysed.
The work is of interest to anyone who, in addition to colourful graphs, would like to understand how exactly process mining works, which algorithms are used in the background and which problems arise with this form of process analysis. We did not want to withhold this very good work from you and have attached it at the end of this blog post.
We would like to thank Mathias Kirsch for making his work available to us and wish him all the best for his Master’s degree.
Content Listing
Share This Article
Data Analytics
Throwback Webinar AI-Powered Cash Back Analytics
Data Extraction
dab Nexus Content Suite Plus
Authorization Assurance
dab:AuthorizationAssurance
Request a demo.
I have read the privacy policy .
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply .
Become a partner.
We use cookies to optimize our website for you and to continuously improve it.
We and our partners use cookies to enhance your experience and understand how our digital platforms are used. See our privacy policy for more information. Privacy policy Imprint
Skip to Content Skip to Main Navigation Skip to Footer Skip to Search
Faculties and institutions.
You Are Here: Thesis Projects
Institutions.
Thesis projects, sub-navigation.
HiWi Positions
We are continuous looking for students interested in doing a thesis project in the PADS group. We are eager to supervise both Bachelor and Master Thesis projects. However, given the many requests, we need to be selective and align such projects to our expertise and research goals. Therefore, we require people to have a data-science mindset and an interest in processes and dynamic behavior. Most of the thesis projects are in the field of process mining. Therefore, we require potential students to show that they have an understanding of the existing field. Having process mining knowledge, e.g., obtained in the Business Process Intelligence (BPI) course at RWTH running in the second semester (SS) or the Coursera MOOC on Process Mining, is desirable. This makes it easier to discuss possible thesis projects in areas such as process discovery, conformance checking, performance analysis, predictive process analytics, automated process improvement, responsible process mining, etc. If you can still elect your courses, we also recommend the master courses Introduction to Data Science (WS) and Advanced Process Mining (SS). Also, check out the Seminars and practical assignments running every semester.
If you are interested, please look through the list of available theses on the website. If you have a good resume, good grades, and special expertise and experience in the above-mentioned area but were unable to find a suitable thesis online, please fill out the thesis inquiry form and send it to Viki Peeva [email protected] along with a brief motivation, your CV, and grades. She is in charge of the thesis applications for the PADS group. She will ask further questions to determine whether we can provide you with a thesis that meets your requirements and expertise.
External Thesis Projects
We do NOT supervise external thesis projects unless there is an existing collaboration (e.g., with Celonis) and the topic is related to what we do (e.g., process mining). We welcome bright students who want to specialize in the topics we cover (selected topics on the interface between data science and process science, in particular, process mining). However, we only host students who know about these topics and have shown commitment to dive deeper. Moreover, we only supervise students in our expertise area, that are working on assignments that are carefully defined by us (or in a collaborative effort). Students deserve good supervision. Note that this is also the general policy of the Computer Science department . Therefore, do not be misled by groups outside of Computer Science offering such thesis projects.
Note that the chair also has many possibilities for HiWi jobs related to process mining (either within Fraunhofer FIT or RWTH). However, this is also reserved for excellent students that have acquired a background in process mining and that want to continue a career in process mining (in industry or academia). We discourage people to apply for HiWi jobs without being able to show relevant experience. HiWi opportunities typically follow (or run in parallel) with a thesis project or excellent performance in one of our courses.
last updated: 03/06/2024
You must have JavaScript enabled in order to access the Celonis website. The web browser you're using either doesn't support JavaScript, or it's being blocked. Please check your browser's help resources to learn whether your browser supports JavaScript and how to allow JavaScript.
We highly welcome bachelor or master students, or doctoral candidates interested in writing their thesis, project study, developer study or research seminar papers on process mining and related aspects. It is our mission to empower the next generation of process miners, and this means that we aim to support you and your research as well as we can.
We believe that process mining can make an impact anywhere in the world, and in almost any discipline. Therefore, we explicitly encourage students of all nationalities and backgrounds to join our Celonis STaR Program!
Sign up for the Celonis STaR Program by completing the sign-up form below and receive all the information you may need to successfully write your thesis, project or developer study or research seminar papers:
Directions on how to get your hands on the academic version of the Celonis Software for free
Training and material on how to use, modify, work and upload data within our Celonis Software in the Celonis Academy
Access to our vibrant community of process mining enthusiasts on our Celopeers Forum
Help from our Academic Research & Innovation Coordinator
Moreover, if you need additional resources from our side, such as access to further experts, interviews, or if you are interested in starting a project with another academic partner or one of our customers, we could help you. In this case, we need a One-Page pitch from you, explaining what you need from our side, the scientific excellence of the topic, and its relevance for Celonis (and/or other involved stakeholders). You will receive a template for this pitch after signing up for Celonis STaR Program. The pitches are evaluated internally at least twice a month, and you will hear from us shortly.
Sign up here to receive instant access to our resources.
Are there any limitations as to which countries students can come from or which universities they are working with.
We especially encourage students from outside of Europe to take part in the Celonis STaR Program. All our materials are available in English.
However, Celonis is legally unable to transact (directly or indirectly) with the following countries: Cuba, Iran, North Korea, Sudan, and Syria. In addition, Celonis does not do business in Russia. If the institution you are studying/working at or with is located in/belongs to one of these countries, then you will need to wait until the situation changes to apply for Celonis STaR Program.
Due to capacity reasons, we do not schedule calls with students. For every question you have regarding your project with Celonis, please first read the FAQs and the information and instructions we have given you in our welcome package (you get this after signing up for our STaR program).
If you have questions that are not answered by the FAQs, please check our Celonis Community (you will get the information how to engage here in your welcome letter after signing up)
If you have still not received the information you are looking for, you can write an email to [email protected] and state as a Subject “STaR Program + (topic of your question)”.
If you already know your topic but do not have an academic supervisor yet, we can check within our network whether we know a suitable researcher who can support you. We cannot promise you that we will find somebody, but in most cases this is feasible. It depends on your university whether external supervisors are accepted.
Please note that all communication and the checking of all regulations is in your responsibility. We can only support in making the first introduction.
If you need to sign a Non Disclosure Agreement (NDA) depends on your topic. If you only use our standard material and don’t need anything further you don’t need to sign any documents.
If you need access to internal information at Celonis and your thesis contains confidential information (technical data, customer data), you have to sign a Non-Disclosure-Agreement (NDA).
If your project will contain this internal information, your academic supervisor will have to sign an NDA as well, and the project must not be published.
Please also check the Thesis Guidelines in your Welcome Letter for specific information on Non-Disclosure Agreements and Data Security.
Celonis can provide researchers and thesis students free access to the academic version of our software and help you analyze your own data. We can provide our expertise and help you get started by giving you access to our digital training platform. We will also connect you with fellow students and researchers through the Celonis community platform. This support is entirely provided online by signing up to our thesis program.
Please do not contact us directly, but first follow the steps of this program. In some cases, we can also provide further support such as contact to experts or interviews. In these cases, we perform a pre-selection of relevant topics through a pitch, for which you can access a template after registration.
You as a student are responsible for finding a topic you want to research on. As a company we have no resources to guide you in finding a research topic. Please frame your topic in agreement with your academic supervisor. If you are writing your thesis with a company, please also make sure that the research topic is in line with your company supervisor.
External students (those not working at Celonis) need to be mainly supervised by their academic and/or company supervisors. We do not have the capacity to support every project extensively.
Yes, but only if you use the academic version of our software just for the scope of the project, and only you personally have access to the Celonis account. Any primarily commercial use of our academic version is prohibited, as stated in the terms of use.
Yes! If you want to write your PhD Thesis using Celonis materials, please sign up for our STaR programme. You may book an appointment with our Research & Innovation Coordinator, who will be able to discuss the scope of our involvement. However, we do not give out any PhD scholarships or working positions only with the purpose of writing a PhD thesis.
At the moment, we do not offer working student positions only for the purpose of writing a thesis. However, you can check our career page for open internship or working student positions and then contact us to find out if a combination with your thesis topic is possible.
What we provide after you have signed up for our Thesis Program:
What we do not provide. Due to capacity reasons we can not…
Thank you for your subscription, any question, more celonis, check us in.
Topic areas.
The Service-centric Networking group offers bachelor and master theses in different subject areas:
Topic Areas: Business Process Management, Internet of Things, Supply Chain Management, Machine Learning & AI, Causal Analysis
Topic Areas: Privacy Engineering, Identity Management & Digital Trust, Cloud/Edge Computing, Digital Trust in the Internet of Things
Topic Areas: 6G Networking, IoT Networking, Blockchain and Distributed Ledger Analytics
Please note!
If you are interested in a subject area, please contact our team assistants Andrea Hahn or Sandra Wild ( [email protected] ) and attach your CV, an grades overview and include some basic background information such as your degree program, main areas of study, and most importantly: two or three sentences about what general topic/ direction you would be interested. Our team assistants will put you in touch with matching SNET group members (topic coordinators) which you can then meet in order to discuss open topics in detail.
Name | First Name | Bachelor - Master Thesis | Title | Supervisor |
Appendino | Benjamin | MA | On-device Mobile Application Traffic Monitoring for iOS | Sanjeet Raj Pandey |
Beez | Jan Niklas | MA | Towards Automated Negotiation of Informed Consent | Philip Raschke |
Eichenhofer | Jonathan | MA | Evaluating Monoliths and Microservices for migration to Serverless Architecture | Sanjeet Raj Pandey |
Fisch | Maximilian | BA | A Deep Learning and NLP-Based Approach for Trace Forecasting in Predictive Process Mining | Wolf Rieder |
Funke | Tom | MA | Detecting Ponzi schemes in blockchain application data with process mining | Richard Hobeck |
Gold | Lucas | MA | Integration of a SaaS Application into Platform Ecosystems using the Example of the Open-Source Project PROCEED | Kai Grunert |
Goldgamer | Daniel | BA | A Ledger Agnostic Solution for Credential Revocation with OpenID Connect | Patrick Herbke |
Guo | Hongming | MA | Performance evaluation of trusted communication on QUIC and HTTP/3 protocol | Sanjeet Raj Pandey |
Janßen | Luca | BA | Implementing Verifiable Credentials for Enhanced Transparency and Traceability in the Modern Supply Chain | Kaustabh Barman |
Jiang | Jialun | MA | Resource allocation in Reconfigurable Manufacturing Systems: a message-based approach | Hai Dinh Tuan |
Kahlert | Alwin | BA | Enabling Trusted Identifiers for Internet of Things | Aljoscha Schulte |
Kant | Marten | BA | Automating BPMN Diagram Creation with Large Language Models | Kai Grunert |
Knothe | Adam | BA | A sensor and Wi-Fi based approach for indoor localization on smartphones | Christian René Sechting |
Leonkov | Alex | BA | Privacy-Preserving Telemetry for Crowdsourced Network Traffic Monitoring Applications | Tom Cory |
Li | Heyi | MA | Generating Business Process Models Using Augmented Large Language Models | Wolf Rieder |
Mohona | Tanzira | MA | DIDComm V2 Implementation: A Pathway for Robust Off-chain Applications | Patrick Herbke |
Natusch | Dennis | MA | Authentication in mTLS with Decentralized Identifiers and Verifiable Credentials | Sandro Rodriguez Garzon |
Peppas | Dimitrios | MA | Enhancing Resource Modeling and Management in Hybrid Environments through edge-to-cloud simulation | Hai Dinh Tuan |
Reiter | Nick | MA | Agentic Process Automation: An LLM-backed Approach to autonomously execute Process Workflow Descriptions | Wolf Rieder |
Rohana | Lukas | BA | Time Series Analysis in Process Mining: Evaluating the Effectiveness of LSTM and Transformer Models for Remaining Time Prediction | Wolf Rieder |
Ruban | Anna | BA | Comparing stated and observed Privacy Practices of Mobile Applications | Tom Cory |
Safo | Elias | BA | Reinventing Supply Chains Through Escrow Smart Contracts | Kaustabh Barman |
Seita | Daria | MA | A QUIC Look at Mobile Privacy | Tom Cory |
Serrano Borges | Luis | MA | Deployment Strategies in the Cloud-Edge Continuum: Is Unikernel Container 2.0? | Hai Dinh Tuan |
Siebing | Adrian | BA | SSI Implementation in Autonomous office space | Sanjeet Raj Pandey |
Stross | Kai | BA | Using Graph Neural Networks for Web Tracker Detection | Wolf Rieder |
Wehner | Florian | BA | Secure Ballots: Ensuring Voter Authentication and Anonymity in Online Elections through Self Sovereign Identity | Patrick Herbke |
Yolcu | Nazim | BA | Dynamische Generierung von Cookie-Bannern: Eine Untersuchung zur Integration von browserbasierten Daten für verbesserte Nutzerinformationen | Philip Raschke |
Zdanowski | Patrick | BA | Development of an interactive digital campus map with navigation functionality for mobile devices | Christian René Sechting |
Name | First Name | Bachelor - Master Thesis | Title | Supervisor |
Fu | Jianeng | MA | Secure messaging agent for 5G Core communication | Hai Dinh Tuan |
Gharibnejad | Erfan | BA | Securing V2X communication and providing authenticity with DIDs and VCs | Artur Philipp |
Heitkamp | Kristina | BA | On-device Modification of Mobile Application Security Configurations | Tom Cory |
Huynh | Thu-My | MA | Design and Implementation of an Interactive Visualization Tool to Increase Transparency of Web Tracking | Philip Raschke |
Jeong | Soo Min | MA | Matching Online and Offline Users for Hybrid Evaluation of Recommender Algorithms | Tobias Eichinger |
Kahlert | Alwin | BA | Enabling Trusted Identifiers for Internet of Things | Aljoscha Schulte |
Kelbel | Vincent | MA | Integration of SSI into the Blade IDM to Enable DIDComm-based Communication in Blade | Sebastian Göndör |
Kengne Tene | Armand Borel | BA | Integration of Optimization Algorithms for Time Management of Course Preparations in Higher Education | Patrick Herbke |
Lösche | Simon Luca | BA | Time-series Analysis of Android HTTP Traffic | Tom Cory |
Mlaouhi | Alaa | BA | Comparison of state management solutions for serverless computing | Maria Mora Martinez |
Orjuela Pico | Brayan Steven | MA | Decentralized Revocation of Verifiable Credentials | Patrick Herbke |
Pevzner | Sarah Moriel | BA | DIDComm as Communication Protocol for Self-hosted Decentralized Service Federations | Sebastian Göndör |
Pfoch | Linus | MA | Derivation of BPMN-based process models from SAP-based product structure data | Kai Grunert |
Pham | Kevin Hai Nam | BA | Secure Web of Things Discovery with DIDs and VCs | Artur Philipp |
Reich | Moritz | MA | A Plugin System for a Software as a Service Application based on the Example of PROCEED | Kai Grunert |
Rieder | Wolf | MA | DIDComm as Communication Protocol for Self-hosted Decentralized Service Federations | Philip Raschke |
Rohmann | Leon | BA | Towards a Modular Privacy Score Framework for Mobile Applications | Tom Cory |
Rüger | Tom | MA | Realizing Polyglot Software Modules in Decentralized and Extensible Service Architectures | Sebastian Göndör |
Schmolenski | Niklas | BA | Detecting latent confounders in purely observational data | Boris Lorbeer |
Sharma | Ankush | MA | Location-aware Serverless Function Placement Approach in an Edge Environment | Maria Mora Martinez |
Shawarba | Naseem | BA | Location-aware Serverless Function Placement Approach in an Edge Environment | Tobias Eichinger |
Sindermann | Jean-Pascal | Ba | SSI Profile: Using DIDs and VCs for W3C Web of Things (WoT) Thing Description authenticity | Artur Philipp |
Six | Florian | BA | Adaptive Service Placement based on application level information | Hai Dinh Tuan |
Stender | Nick Jörn | MA | Verifiable Credentials for Network Access Control | Artur Philipp |
Westlinning | Steffen | MA | Optimizing Cold Start Latency in Serverless using Function Discovery | Sanjeet Raj Pandey |
Wilhelm | Mai Khanh Isabelle | MA | Creation of a Middleware for Multi-Vendor Communication with Mobile Robots | Kai Grunert |
Wittig | Luisa | BA | Performance Analysis of Process Diagrams within the PROCEED Business Process Management System | Kai Grunert |
Zountsas | Georgios | BA | A platform for automated summaries generation for medical articles | Aikaterini Katsarou |
Name | First Name | Bachelor - Master Thesis | Title | Supervisor |
Abdelkhalek | Yousef | MA | Incorporating OCSP Stapling in EDHOC for Certificate Revocation in Resource Constrained Environments | Aljoscha Schulte |
Akimov | Grigori | MA | Detecting Liquidity Draining “Rug-Pull” Patterns in CPMM Cryptocurrency Exchanges | Friedhelm Victor |
Alissa | Fadel | BA | Cross-Browser Comparison of Web Tracker Activity Using T.EX | Philip Raschke |
Baumann | Florian | BA | A Coarse Location-Service for Collaborating with Approximately Nearest Neighbors | Tobias Eichinger |
Barkemeyer | David | BA | Implementing an NDNCERT Challenge based on Verifiable Credentials | Aljoscha Schulte |
Barman | Kaustabh | MA | Managing Higher Education Certificates using Self-Sovereign Identity Paradigm | Patrick Herbke |
Chada | Wepan | MA | Understanding Adherence to Ecological Momentary Assessments in the Example of the TYDR App | Aikaterini Katsarou |
Colak | Cihad | BA | ML-based Tracker Detection in Android Applications | Tom Cory |
Dhakal | Uttam | MA | Abstractive text summarization of scientific articles from Bio - medical domain | Aikaterini Katsarou |
Dungs | Imke | BA | Creation of BPMN Processes with a Smart Voice Assistant | Kai Grunert |
Douss | Nabil | MA | Multi-domain Sentiment Analysis with an Active learning Mechanism | Aikaterini Katsarou |
Frech | Berit | MA | MOBIDID - Decentralized Mobile Messaging using DIDComm | Hakan Yildiz |
George | Lukas | BA | STARK-based Chain Relays | Martin Westerkamp |
Hibatullah | Rayhan Naufal | BA | State management in 5G using Akka Serverless | Maria Mora Martinez |
Hofmann | Pascal | BA | Analysis and Implementation of Secure Key Management in Mobile Wallet Applications | Sebastian Göndör |
Hrustic | Amira | BA | Analysing Web Tracking in Mobile Android HTTP Traffic | Tom Cory |
Isaias Sanchez Figueroa | Adrian | BA | Integrating DIDComm Messaging in ActivityPub-based Social Networks | Sebastian Göndör |
Jie | Anna | MA | An Intelligent Decision Support System for Test Optimization Purposes | Aikaterini Katsarou |
Joderi-Shoferi | Janis | BA | Adaptive Processes in a decentralized Business Process Management System | Kai Grunert |
Kalz | Andrea | MA | Synergies between Verifiable Credentials and Information-Centric networks on the example of the Named Data Networking Project | Aljoscha Schulte |
Keller | Laura | BA | Analysing the Effect of Android Permissions on Mobile Tracking | Tom Cory |
Kmit | Anastasia | BA | Machine Learning-supported Analysis of Mobile Application Traffic | Tom Cory |
Krause | Jonas | BA | Managing Higher Education Certificates using Self-Sovereign Identity Paradigm | Patrick Herbke |
Ksoll | Maximilian | MA | Challenges of implementing microservices as serverless functions | Maria Mora Martinez |
Kutal | Volkan | BA | Mobile Traffic Data Visualization for Web Tracker Detection | Tom Cory, Philip Raschke |
Lamichane | Ananta | MA | A Hybrid Evaluation Scheme for Making Qualitative Feedback Available to Recommender Systems Researchers | Tobias Eichinger |
Liu | Liming | MA | Coordinated Resolution of Compute Request in the Compute-centric Networks | Hai Dinh Tuan |
Lösche | Simon | BA | Time-series Analysis of Android HTTP Traffic | Tom Cory |
Lukyanovich | Nastassia | BA | Visualising Mobile Web Traffic Characteristics with an Interactive Dashboard | Tom Cory |
Matini | Shirkouh | MA | Cryptocurrency volatility prediction using sentiment analysis from social media | Aikaterini Katsarou |
Mohsen | Mustafa Ismail | BA | Comparative study of causal discovery methods | Boris Lorbeer |
Nawaz | Hafiz Umar | MA | State persistance evaluation for the stateful serverless platforms | Maria Mora Martinez |
Odorfer | Roland | MA | Decentralized Identity Management and its Application in Future Cellular Networks | Sandro Rodriguez Garzon |
Oppermann | Laura | MA | Concept and Design of an Efficient Search and Discovery Mechanism for Decentralized Ledger-based Marketplaces | Sebastian Göndör |
Rau | Jonathan | MA | Distributed Ledgers as Shared Audit Trails for Carbon Removal | Marcel Müller, Robin Clemens |
Rhimi | Radhouane | BA | Platform for crowdsourcing hate speech | Aikaterini Katsarou |
Rucaj | Denisa | MA | Feature-based Extractive Multi-document Summarisation | Bianca Lüders, Aikaterini Katsarou |
Saadi | Juba | MA | Decentralized Scoring for Adjusting Publication Reach on Online Social Networks | Sebastian Göndör |
Schulenberg | Emilia | BA | Design and Implementation of a Cloud Wallet for Self-hosted Decentralized Services | Sebastian Göndör |
Schwerdtner | Henry | BA | Identifying Structural Web Tracker Characteristics With Real-Time Graph Analysis | Philip Raschke |
Sivirina | Anastasiia | MA | Enabling Verifiable Credentials Interoperability with the Enhancement of the ACAPY Framework | Hakan Yildiz |
Skodzik | Melanie | MA | Analyzing Market Manipulation on Automated Market Maker based Decentralized Cryptocurrency Exchanges | Friedhelm Victor |
Song | Yong Huyn | BA | A Comparison of Web Tracking and its Mobile Counterpart | Tom Cory |
Tsaplina | Olesia | BA | Datenschutz in dezentralen sozialen Netzwerkplattformen: Entwicklung von einem Dashboard zum verteilten Datenschutzmanagement | Philip Raschek, Sebastian Göndör |
Urban | Tobias | BA | Analyse der Evolution von Featuresets sozialer Netzwerkplattformen | Sebastian Göndör |
Wang | Mingzhi | MA | MATSim-based Data Diffusion Models for Dissemination-based Collaborative Filtering | Tobias Eichinger |
Name | First Name | Bachelor - Master Thesis | Title | Supervisor |
Akimov | Grigori | MA | Detecting Liquidity Draining “Rug-Pull” Patterns in CPMM Cryptocurrency Exchanges | Friedhelm Victor |
Ebermann | Marcel | BA | On the Accuracy of Block Timestamp-based Time-sensitive Smart Contracts on Private Permissioned Ethereum Blockchains | Tobias Eichinger |
Fan | Yuanzhang | MA | Optimizing content dissemination in federated online social networks | Sebastian Göndör |
Herbke | Patrick | MA | Detection of Web Tracker Characteristics with Graph Analysis Methods | Philp Raschke |
Hertwig | Kevin | BA | Development of an Identity and Access Management for a decentralized Business Process Management System | Kai Grunert |
Hrustic | Amira | BA | Analysing Web Tracking in Mobile Android HTTP Traffic | Thomas Cory |
Jeney | Roxana | MA | Multi-Domain Sentiment Classification using an LSTM-based Framework with Attention Mechanism | Aikaterini Katsarou |
Kutal | Volkan | BA | Mobile Traffic Data Visualization for Web Tracker Detection | Tom Cory, Philip Raschke |
Lang | Carolin Sophie | BA | Mapping Company Information to Web Domains for Enhanced User Transparency | Philip Raschke |
Li | Ziyang | BA | Best Practices for using JavaScript on Resource-Constrained Microcontrollers -> geändert: Memory Consumption Analysis for JavaScript Engines on Microcontrollers | Kai Grunert |
Mohamed | Gehad Gamal Salem Awad | BA | Intercepting and Monitoring TLS Traffic in Mobile Applications | Thomas Cory |
Nawaz | Hafiz Umar | MA | State persistance evaluation for the stateful serverless platforms | Maria Mora - Martinez |
Pandey | Sanjeet Raj | MA | Smart function placement for serverless applications | Maria Mora - Martinez |
Pelz | Konstantin | BA | A Context-aware Mobile App to Compute Location- and Air Pollution-based Emission Compensations for Car Rides | Sandro Rodriguez Garzon |
Peppas | Dimitrios | BA | Design and Implementation of a Mobile Sensing App for Experience Sampling | Felix Beierle |
Rieder | Wolf Siegfried | BA | On The Usefulness of HTTP Responses to Identify Differences Between Non- And Web Trackers | Philip Raschke |
Rucaj | Denisa | MA | Feature-based Extractive Multi-document Summarisation | Bianca Lüders, Katerina Katsarou |
Ryu | Youngrak | MA | Data storage in DHTs: A Framework for storing larger data in Kademlia | Martin Westerkamp, Dirk Thatmann |
Sarder | Uma | MA | Design and Implementation of Control Flow and Permission Management for Polyglot Distributed Service Modules in the Blade Ecosystem | Sebastian Göndör |
Schneider | Maximilian | BA | A Web Service to Enable the Computation of Dynamic Air Pollution-aware Road User Charges on Mobile Devices | Sandro Rodriguez Garzon |
Stumpf | Julien | BA | Using Ad Blocking Filter Lists for Automated Labeling of Web Tracker Traffic | Philip Raschke |
Syed Qasim | Hussain | MA | Blockchain-based Trusted Execution Environments for Privacy-preserving Medical Research | Marcel Müller |
Yang | Huaning | BA | How Representative Is Measured Network Traffic: Individual Browsing Behavior And Its Technical Manifestation | Philip Raschke |
The graduate seminar is a forum for scientific discussions. Students have the possibility to discuss their theses amongst fellow students, graduates and the professor of SNET. In the early phase of their work, their thesis approach is discussed, while at the end the results are presented. Students who are currently working on their thesis at our chair are required to attend each of the meetings, especially if other related topics are being presented. We are also looking forward to welcoming other students who are interested in the seminar or are about to write a thesis at our chair.
Additional Information
Students who decide to write a thesis at our chair are required to talk about their topic and the approach they are going to follow in an initial presentation in the early phase of their thesis time. This presentation should take 10 minutes with 5 minutes of questions and answers afterwards. After finishing their thesis, students have to defend it by giving a talk, in which they demonstrate the results achieved in the thesis. Bachelor students should talk 15 minutes with 5 minutes of questions and answers , whereas Master students are required to present 20 minutes and discuss it afterwards for 10 minutes .
September 4, 2024.
Title | Presentation | Students | Time | Supervisor |
Towards Automated Negotiation of Informed Consent | Master Defense | Jan Niklas Beez | 14.15 | Philip Raschke |
Implementation of an eIDAS qualified trust service provider | Bachelor Initial | Leon Grosskopf | 14.55 | Awid Vaziry |
The eIDAS "European Digital Identity Wallet" (EUDIW): Evaluation of Reference Frameworks, Implementations, and User Experience Factors | Bachelor Initial | Tobias Westphal | 15.15 | Awid Vaziry |
Transforming Data Strategies for a Privacy-first Era | Master Initial | Nastassia Lukyanovich | 15.35 | Tom Cory |
Using Graph Neural Networks for Web Tracker Detection | Bachelor Defense | Kai Stross | 15.55 | Wolf Rieder |
Decentralized Credential Issuance with Threshold Signatures | Bachelor Initial | Anish Sapkota | 16.25 | Patrick Herbke |
Title | Presentation | Students | Time | Supervisor |
Porting and Evaluation of Http3 on DIDComm with constrained use-cases | Master Initial | Anton Curanz | 14.15 | Sanjeet Raj Pandey |
Who's Watching? An In-Depth Study of Prominent Third-Party Trackers in Android Application | Bachelor Initial | Caroline Wacker | 14.35 | Tom Cory |
On-device Mobile Application Traffic Monitoring for iOS | Master Defense | Benjamin Appendino | 14.55 | Tom Cory |
Predicting Preferences: A Plug-and-Play Architecture Recommender Systems Using Large Language Models AI Databases | Master Initial | Trung Duc Nguyen | 15.35 | Carlo Segat |
Design and Implementation of a Digital Business Process Twin | Master Initial | Yong Hyun Song | 15.55 | Wolf Rieder |
Title | Presentation | Students | Time | Supervisor |
Enhancing Resource Modeling and Management in Hybrid Environments through edge-to-cloud simulation | Master Defense | Dimitrios Peppas | 14.15 | Hai Dinh Tuan |
Evaluating Monoliths and Microservices for a migration to Serverless Architecture | Bachelor Defense | Jonathan Eichenhofer | 14.55 | Sanjeet Raj Pandey |
Evaluating Open-source LLMs for Privacy Policy Annotation | Bachelor Initial | Janis Hahn | 15.40 | Thomas Cory |
eIDAS 2.0: Potentials and Challenges of Becoming a Qualified Trust Service Provider | Master Initial | Luca Vetter | 16.00 | Awid Vaziry |
Cloud compute scheduler | Master Initial | Tien Hong Nguyen | 16.20 | Hai Dinh Tuan |
VC based Kubernetes volume management | Master Initial | Ismail Kutlay Acar | 16.40 | Sanjeet Raj Pandey |
Optimizing Recommendations Through Large Language Models: A Study on Open Source Model Effectiveness and Implementation | Master Initial | Trung Duc Nguyen | 17.00 | Carlo Segat |
Title | Presentation | Students | Time | Supervisor |
Building a DID Method for Information-Centric Networks | Bachelor Defense | Alwin Kahlert | 14.15 | Aljoscha Schulte |
Authentication in mTLS with Decentralized Identifiers and Verifiable Credentials | Master Defense | Dennis Natusch | 14.45 | Sandro Rodriguez Garzon |
Trusted container system using ZKP | Master Initial | Tobias Uhlich | 15.25 | Sanjeet Raj Pandey |
Konzept und Simulation eines Quantum Key-Distribution-Netzwerkes mit Luftschiffen in der Stratosphäre | Bachelor Initial | Jonathan Augustin | 15.45 | Axel Küpper |
Enhancing text2SQL with preemptive error information | Bachelor Initial | William Schneider | 16.05 | Christopher Nguyen |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Time Series Analysis in Process Mining | Bachelor Initial | Lukas Rohana | 14.15 | Wolf Rieder |
Reinventing Supply Chains Through Escrow Smart Contracts | Bachelor Initial | Elias Safo | 14.35 | Kaustabh Barman |
Chained Verifiable credentials as verifiable receipts in supply chain | Bachelor Initial | Luca Janssen | 14.55 | Kaustabh Barman |
Generation of BPMN Diagram using Large Language Models | Bachelor Initial | Marten Kant | 15.15 | Kai Grunert |
Decentralized Revocation of Verifiable Credentials | Master Defense | Brayan Steven Orjuela Pico | 15.35 | Patrick Herbke |
Title | Presentation | Students | Time | Supervisor |
Design and Implementation of a Persistence Layer on the Example of the Cloud Application PROCEED | Bachelor Initial | Anish Sapkota | 14.15 | Kai Grunert |
Development of an interactive digital campus map with navigation functionality for mobile devices | Bachelor Defense | Patrick Zdanowski | 14.35 | Christian René Sechting |
A sensor and Wi-Fi based approach for indoor localization on smartphones | Bachelor Defense | Adam Knothe | 15.05 | Christian René Sechting |
Decentralized Revocation of Verifiable Credentials | Master Defense | Brayan Steven Orjuela Pico | 15.35 | Patrick Herbke |
Dynamic Cookie-Banner Generation | Bachelor Initial | Nazim Yolcu | 16.15 | Philip Raschke |
Decentralized Credential Status Management with Bloom and Cuckoo Filter: A Performance Comparison in Hyperledger Fabric | Bachelor Initial | Ali Mohammadi | 16.35 | Patrick Herbke |
Title | Presentation | Students | Time | Supervisor |
Privacy-Preserving Telemetry for Crowdsourced Network Traffic Monitoring Applications | Bachelor Defense | Alex Leonkov | 14.15 | Tom Cory |
Using Graph Neural Networks for Web Tracker Detection | Bachelor Initial | Kai Stross | 14.45 | Wolf Rieder |
Empowering Off-Chain Applications through the Implementation of DIDComm V2 | Bachelor Initial | Tanzira Mohana | 15.05 | Patrick Herbke |
Time Series Analysis in Process Mining | Bachelor Initial | Lukas Rohana | 15.25 | Wolf Rieder |
RPA with LLMs | Bachelor Initial | Nick Reiter | 15.45 | Wolf Rieder |
Titel | Präsentation | Studierende | Uhrzeit | Betreuer |
Plugin Architecture on the Example of PROCEED | Master Defense | Moritz Reich | 14.15 | Kai Grunert |
A Deep Learning and NLP-Based Approach for Trace Forecasting in Predictive Process Mining | Bachelor Defense | Maximilian Oliver Fisch | 14.55 | Wolf Rieder |
Deployment Strategies in the Cloud-Edge Continuum: Is Unikernel Container 2.0? | Master Initial | Luis Borges | 15.25 | Hai Dinh Tuan |
Towards a Modular Privacy Score Framework for Mobile Applications | Bachelor Defense | Leon Rohmann | 15.45 | Tom Cory |
Comparing stated and observed Privacy Practices of Mobile Applications | Bachelor Defense | Anna Ruban | 16.15 | Wolf Rieder |
Integration of Optimization Algorithms for Time Management of Course Preparations in Higher Education | Bachelor Defense | Armand Borel Kengne Tene | 16.45 | Patrick Herbke |
Title | Presentation | Students | Time | Supervisor |
Verifiable Credentials for Network Access Control | Master Defense | Nick Jörn Stender | 14.15 | Artur Philipp |
Forensic Checkpointing for microservice portability | Master Initial | Jialun Jiang | 14.55 | Hai Dinh Tuan |
Beyond Traditional Algorithms: How Large Language Models are Transforming Process Discovery in Process Mining | Master Initial | Heyi Li | 15.15 | Wolf Rieder |
Token flow analysis for process mining on blockchain data | Master Initial | Tom Funke | 15.35 | Richard Hobeck |
This section covers general topics and frequently asked questions about the organizational process of bachelor, master and diploma theses at our department. Please read this page carefully before contacting one of the supervisors so that you are well prepared when you express your interest and discuss the topics with the supervisors.
The organizational workflow of a bachelor's, master's or diploma thesis at SNET is described below:
Please note that it must be submitted at least 6 weeks before the end of the semester to ensure that you receive your grade in the same semester. Therefore, you must register your thesis with the Examination Office at least 4 months + 6 weeks for Bachelor's theses and 6 months + 6 weeks for Master's theses prior to submission.
Also when preparing a thesis, please observe the following instructions:
IMAGES
VIDEO
COMMENTS
Evaluating business process performance based on process mining analyzing process mining output to evaluate and interpret the performance of business processes van den Ingh, L.O. Award date: 2016 Link to publication Disclaimer This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of ...
In the following use cases the application of the process mining techniques will be described in the tools Disco and Celonis before ProM. This is done to avoid starting the use case based analysis with a long explanation of the con guration of a plug-in in ProM. 4.2. Discovery of a process model from an event log.
assignment is to use process mining as the replacement tool. In this thesis, a new methodology for benchmarking business processes by means of process mining is proposed. Towards designing the new methodology, two high-level methodologies, one for benchmarking projects and one for process mining projects, were combined into one.
Through process mining it is possible to (i) discover the process that better describes the user behavior, (ii) nd useful insights, (iii) discover and compare the processes of di erent behavi-oural clusters of users. Moreover, this thesis aims to make a second contribution by bridging the gap between process mining and recommender systems worlds.
BACHELOR Churn Prediction Using Process Mining Broekgaarden, Bram O. Award date: 2021 Link to publication Disclaimer This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student theses are made available in the TU/e repository upon obtaining the required degree.
Bachelor and Master Thesis. General Information. Our team offers bachelor and master thesis topics as well as student projects to be written in English. Student may apply for a thesis or a study project during within two application windows in a year, in which new topics are made available. The first window is open from February 1st until April ...
an appropriate process mining methodology will give practitioners guidance in applying process mining in organizations, it will also support in sharing best practices, stimulating the adoption of process mining in the field and preventing reinventing the wheel. This Master [s Thesis aimed at
This thesis can be interesting for multiple parties. For each of these parties' different parts of this method are interesting. For one: the academic community. In the Process Mining Manifesto it was proposed that Process Mining should be used in combination with Business Process simulation. The entire paper is about this process, so for them I
Chapter 1 Introduction This thesis is the result of a graduation project carried out within Fluxicon1 and the Architecture of Infor- mation System (AIS) group2 of the Mathematics and Computer Science Department of TU/e. The goal of the project was the evaluation of commercial process mining systems based on a defined set of criteria.
This repository contains artifacts of my bachelor thesis at the chair for Information Systems and Business Process Management (Prof. Helmut Krcmar). I wrote the thesis during the winter semester 2021/2022. The topic of the thesis was Simulation of Continuous Business Process Data for Process Mining in Teaching.
Before you lies my thesis that concludes my bachelor Industrial Engineering and Management. During my time with the eSportslab Twente, I worked on developing a method to turn FIFA data ... in the process mining manifesto by Van der Aalst et al. (2016) as a guiding principle for process mining.
Bachelor's Thesis; Master Thesis; Dissertations; Courses; Study Guide; Research. Journal of Interaction Science. Overview; Vol. 7 (June 17, 2019) ... The aim of this thesis is to answer the question of how business processes can be created in a data-driven manner using process mining in order to gain a better insight into the company-wide ...
Process mining is a set of techniques that use event data to provide valuable insights into processes. The techniques can be used to mine process models, and provide performance information. They can also be used to analyze how people in those processes are working together and how they perform. The conformance of a process model and an event ...
The thesis further focuses on the technical implementation and parameters one could apply to create such procedures and prediction models. The purpose is to ensure a first level of understanding on the different realization methods of predictive process monitoring (PPM) and to understand how the authors conducted their research procedure.
This thesis sheds light on the topic of process mining on a scientific basis. Among other things, the methods, challenges and limitations, the potential of process mining and the degree of maturity of various algorithms are analysed.
With Process Mining you can find bottlenecks in business processes using event log data. I used the pbiviz package from Microsoft to develop the custom visual and dagre-d3 (MIT License) to render the flowchart.
This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student ... on what factors affect the success of a process mining project 3. This thesis can be seen as an initial step for developing design propositions that provide
Thesis Projects. We are continuous looking for students interested in doing a thesis project in the PADS group. We are eager to supervise both Bachelor and Master Thesis projects. However, given the many requests, we need to be selective and align such projects to our expertise and research goals. Therefore, we require people to have a data ...
This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student ... Process mining in healthcare systems is difficult because a log contains many distinct activities, especially with many rather low level activities, and mining such a log results in a too detailed ...
We highly welcome bachelor or master students, or doctoral candidates interested in writing their thesis, project study, developer study or research seminar papers on process mining and related aspects.It is our mission to empower the next generation of process miners, and this means that we aim to support you and your research as well as we can.
Bachelor thesis in process mining of agile software development - GitHub - inbalehrer/Bsc: Bachelor thesis in process mining of agile software development
This thesis first introduces the basic concepts of data mining, such as the definition of data mining, its basic function, common methods and basic process, and two common data mining methods, classification and clustering. Then a data mining application in network is discussed in detail, followed by a brief introduction on data mining ...
Also when preparing a thesis, please observe the following instructions: Please check the APO of Faculty IV, especially § 13 (Final Theses) Please write your thesis in German (BA)/ English (BA/ MA) For Bachelor's theses, you should write approx. 30-50 pages and for Master's theses approx. 50-90 pages.