255 research outputs found

    Finding a suitable performance testing tool

    Get PDF
    Abstract. The pursuit of finding the most suitable testing software for each project is a difficult task as there are a lot of software effective finding certain kind of problems but completely missing others in the field of stress and load testing. A silver bullet solving all problems in a cost effective and reliable way has not yet been found. This project was done as a systematic literature review to find whether there are solutions documented capable of testing everything in a cost-effective way. The document starts with an introduction of the task, originating from a real software testing company’s suggestion of finding suitable test software that can, cost effectively and reliably, fulfil the needs of the company. A history section is describing the reason of testing importance, basics of testing and what others have found in their studies of the area. The research method is described in detail followed by results describing tools found during the research divided in sections by license type. The sectioning by license type was selected for the benefit of testing companies that are interested in further developing tools found to their own interest. Findings and answered research questions were presented and discussed followed by possible implications and further research suggestions to future scholars interested in the matter. The systematic literature review found a total of 40 different tools identified during the data extraction process. One complete software system was available commercially including heavy support and help functions for the customer. A different approach linking open source and relatively inexpensive pieces of software together to achieve a composite solution was also identified. The solution included the most common and most popular individual piece of software identified by the study. All found pieces of software were listed and commented briefly mainly with information originating from the authors’ home pages

    Production Capability Creation (PCC) for Collaborative Construction Projects – A Qualitative Study From Finland

    Get PDF
    The construction industry has been suffering from modest productivity development in recent decades. To address the recognized problems, collaborative delivery methods are replacing traditional project delivery models, especially in large and complex projects.The aim of this research is to describe the production capability creation (PCC) process as a solution for planning the production phase. The PCC process should be implemented parallel to the design phase and owned by the production. A qualitative and inductive approach, based primarily on case company interviews, is applied to identify the twelve most important challenges for preplanning in the design phase from a group of different types of stakeholders in construction projects. Based on these challenges, the main areas of PCC are structured, solving the depicted production challenges, enabling a wasteless and cost-efficient production phase to avoid unnecessary delays and problems. Parallel implementation of PCC and design processes of the building naturally also improve the result of the design itself. With PCC, contractors can recognize the need for improvement in their processes but, more importantly, can directly contribute to the design of the building. Described PCC process solves major challenges emerging from the case company interviews. Earlier literature on capability creation is scarce, and for the construction industry it is even more narrow. The PCC process presented in this research enables significant improvement in efficiency and effectiveness, and the elimination of waste in the construction industry

    Differences in collagen prolyl 4-hydroxylase assembly between two Caenorhabditis nematode species despite high amino acid sequence identity of the enzyme subunits

    Get PDF
    The collagen prolyl 4-hydroxylases (P4Hs) are essential for proper extracellular matrix formation in multicellular organisms. The vertebrate enzymes are α2β2 tetramers, in which the β subunits are identical to protein disulfide isomerase (PDI). Unique P4H forms have been shown to assemble from the <i>Caenorhabditis</i> <i>elegans</i> catalytic α subunit isoforms PHY-1 and PHY-2 and the β subunit PDI-2. A mixed PHY-1/PHY-2/(PDI-2)<sub>2</sub> tetramer is the major form, while PHY-1/PDI- 2 and PHY-2/PDI-2 dimers are also assembled but less efficiently. Cloning and characterization of the orthologous subunits from the closely related nematode <i>Caenorhabditis</i> <i>briggsae</i> revealed distinct differences in the assembly of active P4H forms in spite of the extremely high amino acid sequence identity (92-97%) between the <i>C. briggsae</i> and <i>C. elegans</i> subunits. In addition to a PHY-1/PHY-2(PDI-2)<sub>2</sub> tetramer and a PHY-1/PDI-2 dimer, an active (PHY- 2)<sub>2</sub>(PDI-2)<sub>2</sub> tetramer was formed in <i>C. briggsae</i> instead of a PHY-2/PDI-2 dimer. Site-directed mutagenesis studies and generation of inter-species hybrid polypeptides showed that the N-terminal halves of the <i>Caenorhabditis</i> PHY-2 polypeptides determine their assembly properties. Genetic disruption of <i>C. briggsae phy-1</i> (<i>Cb-dpy-18</i>) via a <i>Mos1</i> insertion resulted a small (short) phenotype that is less severe than the dumpy (short and fat) phenotype of the corresponding <i>C. elegans</i> mutants (<i>Ce-dpy-18</i>). <i>C. briggsae</i> <i>phy-2</i> RNA interference produced no visible phenotype in the wild type nematodes but produced a severe dumpy phenotype and larval arrest in <i>phy-1</i> mutants. Genetic complementation of the <i>C. briggsae</i> and <i>C. elegans</i> <i>phy-1</i> mutants was achieved by injection of a wild type <i>phy-1</i> gene from either species

    Space greeter:a low-powered facial recognition device for public spaces

    Get PDF
    Abstract. Facial recognition is becoming more common all the time with its potentials and with its threats. It’s getting more accurate and, it has gotten multiple use cases by far, for example in the field of security. As the technology has matured and highly efficient low-cost computers have been developed, it is now possible to implement an affordable real-time facial recognition system. This thesis contains our implementation of a facial recognition software that aims to recognise person’s face and attach it to a name from a database in order to greet them by name. In addition, this thesis contains the evaluation of the implementation and possible future work. We examine existing programs and libraries in order to determine which would work in our use case. For facial recognition, OpenCV library was deemed the best option for its straightforward implementation and a broad range of functions, basic HTML and PHP based website for user interface and MySQL for storage. Testing system recognition speed and accuracy in real-life deployment was not possible due to covid-19, but a minor test with fewer participants was concluded. Further testing for face recognition performance was done with a FERET-database. Our tests show that real-time facial recognition with a Raspberry pi 4B as a platform is possible with decent accuracy and speed. In good lighting conditions and with a high confidence level, our algorithm achieved a 2-second delay for face recognition. In theoretical testing using a FERET dataset of 994 persons, our algorithm achieved an accuracy of 93.84\% and a delay of 360-milliseconds when easier images were used. With more difficult and realistic images, the accuracy was 52.80\% and delay 370-milliseconds. Nevertheless, our implementation could be enhanced further, and we discuss the possible means in the summary chapter.Abstract. Kasvojentunnistus yleistyy jatkuvasti samalla luoden uusia mahdollisuuksia, mutta myΓΆs erilaisia uhkia. Kasvojentunnistusohjelmien tarkkuus paranee jatkuvasti ja ympΓ€rillΓ€mme on paljon eri kΓ€yttΓΆkohteita nΓ€ille tarkoille ohjelmille, esimerkiksi turvallisuusalalla. Kasvojentunnistuksen parantuneen tarkkuuden sekΓ€ edullisten tietokoneiden kehityksen myΓΆtΓ€ myΓΆs edulliset reaaliaikaiset kasvojentunnistusohjelmat ovat mahdollistuneet. OpinnΓ€ytetyΓΆssΓ€mme esittelemme oman implementaatiomme kasvojentunnistusjΓ€rjestelmΓ€stΓ€, joka osaa tervehtiΓ€ henkilΓΆitΓ€ heidΓ€n nimillÀÀn. Tutkimme tyΓΆtΓ€mme varten olemassa olevia ohjelmia ja kirjastoja selvittÀÀksemme mitkΓ€ niistΓ€ soveltuisivat parhaiten kΓ€yttΓΆtarkoitukseemme. PÀÀtimme kΓ€yttÀÀ kasvojentunnistukseen OpenCV-kirjastoa sen helppokΓ€yttΓΆisyyden ja runsaiden ominaisuuksien vuoksi. KΓ€yttΓΆliittymΓ€n toteuttamiseen kΓ€ytimme HTML ja PHP -kieliΓ€ sekΓ€ tietokantana toimi MySQL. JΓ€rjestelmΓ€n laajamuotoista testaamista julkisella paikalla emme voineet toteuttaa Covid-19 -viruksen vuoksi, mutta suppeampi testaus suoritettiin muutamalla koehenkilΓΆllΓ€. LisΓ€ksi kasvojentunnistuksen nopeutta ja tarkkuutta mitattiin kΓ€yttΓ€en FERET-tietokantaa. Testimme osoittavat, ettΓ€ kasvojentunnistus on mahdollista toteuttaa kohtuullisella tarkkuudella ja nopeudella Raspberry Pi 4B -tietokonetta kΓ€yttΓ€en. HyvissΓ€ valaistusolosuhteissa algoritmimme saavutti kahden sekunnin viiveen kasvojentunnistamiseen. Teoreettisilla testeillΓ€ kΓ€ytettΓ€essΓ€ FERET-tietojoukkoa 994:stΓ€ ihmisestΓ€ algoritmimme saavutti 93.84\%:n tarkkuuden 360-millisekunnin viiveellΓ€ helpommilla kuvilla. Hankalampia kuvia kΓ€ytettΓ€essΓ€ tarkkuus oli 52.80\% ja viive 370-millisekuntia. Yhteenvedossa tarkastelemme kuinka implementaatiotamme voisi kehittÀÀ edelleen

    Appropriation as a perspective and topic in the study of religion and spirituality

    Get PDF
    Cultural appropriation is a timely topic that has been taking up a lot of space in public discussions. The concept is often applied in heated debates aimed at calling out’ different actors and actions as appropriation, or on the other hand to defend against such accusations. This thematic issue seeks to look at the topic from a broader and more nuanced perspective, asking what different expressions of appropriation appear in the field of and in relation to religion and spirituality. What discourses and discussions emerge around instances of religious and spiritual appropriation? And how is appropriation understood, negotiated or problematized within, across and around different religious and spiritual groups? The publication is part of the research project β€˜Learning from Religion and Spirituality’ (Academy of Finland 2019-2023) [325148]

    New Spirituality from the learning perspective

    Get PDF
    Peer reviewe

    LÀÀkettΓ€ lapselle – kΓ€ytΓ€nnΓΆn niksit puntarissa

    Get PDF

    Silmien liikkeiden simulointi etΓ€lΓ€snΓ€olorobotissa

    Get PDF
    TiivistelmΓ€. Koronaviruspandemian takia etΓ€tyΓΆskentely on lisÀÀntynyt valtavasti. Opiskelijat katsovat luentoja kotoaan ja tyΓΆkaverit nΓ€kevΓ€t toisiaan vain videokuvan vΓ€lityksellΓ€. Kysymykseksi jÀÀ, voiko lΓ€snΓ€oloa parantaa etΓ€tyΓΆskentelyssΓ€ ÀÀnen ja videokuvan lisΓ€ksi. TΓ€ssΓ€ tyΓΆssΓ€ esitellÀÀn jΓ€rjestelmΓ€, joka kopioi kΓ€yttΓ€jΓ€n silmien liikettΓ€ robotin silmien liikkeiksi reaaliajassa. KΓ€yttΓ€jΓ€n kasvoja kuvaamalla saadaan tietoon kΓ€yttΓ€jΓ€n silmien asento tunnistamalla kuvasta kasvot ja sitten rajaamalla silmΓ€t. Silmien asentojen tieto lΓ€hetetÀÀn UDP (User Datagram Protocol) tiedonsiirtoprotokollan avulla toiselle tietokoneelle. SiellΓ€ tieto otetaan vastaan ja lΓ€hetetÀÀn virtuaalikoneelle, jolla kΓ€ytetÀÀn ROS2 (Robot Operating System 2) kΓ€yttΓΆjΓ€rjestelmÀÀ. ROS2-jΓ€rjestelmΓ€ssΓ€ kΓ€ytetÀÀn action client ja data publisher -osaohjelmia. Data publisher lΓ€hettÀÀ action clientille paikkatietoa, jonka avulla robotin liikkuminen tapahtuu. Action client antaa kΓ€skyjΓ€ robotin XL-320 -servoille, jotka liikuttavat robotin silmiΓ€ samaan asentoon kΓ€yttΓ€jΓ€n kanssa. JΓ€rjestelmΓ€n viivettΓ€ testattiin pyytΓ€mΓ€llΓ€ kΓ€yttΓ€jÀÀ katsomaan puolelta toiselle ja mittaamalla viivettΓ€ videokuvasta. AikavΓ€li valittiin kΓ€yttΓ€jΓ€n silmien liikkeiden ja robotin silmien liikkeiden pysΓ€htymisen vΓ€lillΓ€. ViivettΓ€ syntyi tietokoneen laskiessa tunnistusalgorimejΓ€ ja robotin liikuttaessa servoja. Tuloksena saatu viive on liian pitkΓ€ luomaan luonnollista etΓ€lΓ€snΓ€olokokemusta.Simulation of eye movement in a telepresence robot. Abstract. Because of the Coronavirus pandemic, remote working has been increasing significantly. Students watch lectures from home and coworkers see each other only through video. Question remains whether presence can be improved with remote working in addition to voice and video. In this project a system was developed that copies user’s eye movements to robot’s eye movements in real time. Filming the user’s face will give the user’s eyes position by recognizing their face and then cropping their eyes. The eyes position is sent with UDP (User Datagram Protocol) data transfer protocol to another computer. There information is received and sent to virtual machine, which uses ROS2 (Robot Operating System) operating system. ROS2 system uses action client and data publisher nodes. Data publisher sends position information to action client which controls the robot. Action client gives commands to robot’s XL-320 servo motors, which move robot’s eyes to same position as the user’s. System’s delay was tested by asking user to look from side to side and measuring the delay from video. Time interval was chosen between the end of user’s eye movement and the end of robots eye movement. Delay was produced with computer calculating recognition algorithms and robot moving the servos. Resulting delay is too long to create natural telepresence experience

    Current evidence for a modulation of low back pain by human genetic variants

    Get PDF
    The manifestation of chronic back pain depends on structural, psychosocial, occupational and genetic influences. Heritability estimates for back pain range from 30% to 45%. Genetic influences are caused by genes affecting intervertebral disc degeneration or the immune response and genes involved in pain perception, signalling and psychological processing. This inter-individual variability which is partly due to genetic differences would require an individualized pain management to prevent the transition from acute to chronic back pain or improve the outcome. The genetic profile may help to define patients at high risk for chronic pain. We summarize genetic factors that (i) impact on intervertebral disc stability, namely Collagen IX, COL9A3, COL11A1, COL11A2, COL1A1, aggrecan (AGAN), cartilage intermediate layer protein, vitamin D receptor, metalloproteinsase-3 (MMP3), MMP9, and thrombospondin-2, (ii) modify inflammation, namely interleukin-1 (IL-1) locus genes and IL-6 and (iii) and pain signalling namely guanine triphosphate (GTP) cyclohydrolase 1, catechol-O-methyltransferase, ΞΌ opioid receptor (OPMR1), melanocortin 1 receptor (MC1R), transient receptor potential channel A1 and fatty acid amide hydrolase and analgesic drug metabolism (cytochrome P450 [CYP]2D6, CYP2C9)
    • …
    corecore