255 research outputs found
Finding a suitable performance testing tool
Abstract. The pursuit of finding the most suitable testing software for each project is a difficult task as there are a lot of software effective finding certain kind of problems but completely missing others in the field of stress and load testing. A silver bullet solving all problems in a cost effective and reliable way has not yet been found. This project was done as a systematic literature review to find whether there are solutions documented capable of testing everything in a cost-effective way.
The document starts with an introduction of the task, originating from a real software testing companyβs suggestion of finding suitable test software that can, cost effectively and reliably, fulfil the needs of the company. A history section is describing the reason of testing importance, basics of testing and what others have found in their studies of the area. The research method is described in detail followed by results describing tools found during the research divided in sections by license type. The sectioning by license type was selected for the benefit of testing companies that are interested in further developing tools found to their own interest. Findings and answered research questions were presented and discussed followed by possible implications and further research suggestions to future scholars interested in the matter.
The systematic literature review found a total of 40 different tools identified during the data extraction process. One complete software system was available commercially including heavy support and help functions for the customer. A different approach linking open source and relatively inexpensive pieces of software together to achieve a composite solution was also identified. The solution included the most common and most popular individual piece of software identified by the study. All found pieces of software were listed and commented briefly mainly with information originating from the authorsβ home pages
Production Capability Creation (PCC) for Collaborative Construction Projects β A Qualitative Study From Finland
The construction industry has been suffering from modest productivity development in recent decades. To address the recognized problems, collaborative delivery methods are replacing traditional project delivery models, especially in large and complex projects.The aim of this research is to describe the production capability creation (PCC) process as a solution for planning the production phase. The PCC process should be implemented parallel to the design phase and owned by the production. A qualitative and inductive approach, based primarily on case company interviews, is applied to identify the twelve most important challenges for preplanning in the design phase from a group of different types of stakeholders in construction projects. Based on these challenges, the main areas of PCC are structured, solving the depicted production challenges, enabling a wasteless and cost-efficient production phase to avoid unnecessary delays and problems. Parallel implementation of PCC and design processes of the building naturally also improve the result of the design itself. With PCC, contractors can recognize the need for improvement in their processes but, more importantly, can directly contribute to the design of the building. Described PCC process solves major challenges emerging from the case company interviews. Earlier literature on capability creation is scarce, and for the construction industry it is even more narrow. The PCC process presented in this research enables significant improvement in efficiency and effectiveness, and the elimination of waste in the construction industry
Differences in collagen prolyl 4-hydroxylase assembly between two Caenorhabditis nematode species despite high amino acid sequence identity of the enzyme subunits
The collagen prolyl 4-hydroxylases (P4Hs) are
essential for proper extracellular matrix
formation in multicellular organisms. The
vertebrate enzymes are α2β2 tetramers, in
which the β subunits are identical to protein
disulfide isomerase (PDI). Unique P4H forms
have been shown to assemble from the
<i>Caenorhabditis</i> <i>elegans</i> catalytic α subunit
isoforms PHY-1 and PHY-2 and the β subunit
PDI-2. A mixed PHY-1/PHY-2/(PDI-2)<sub>2</sub>
tetramer is the major form, while PHY-1/PDI-
2 and PHY-2/PDI-2 dimers are also assembled
but less efficiently. Cloning and
characterization of the orthologous subunits
from the closely related nematode
<i>Caenorhabditis</i> <i>briggsae</i> revealed distinct
differences in the assembly of active P4H
forms in spite of the extremely high amino
acid sequence identity (92-97%) between the
<i>C. briggsae</i> and <i>C. elegans</i> subunits. In
addition to a PHY-1/PHY-2(PDI-2)<sub>2</sub> tetramer
and a PHY-1/PDI-2 dimer, an active (PHY-
2)<sub>2</sub>(PDI-2)<sub>2</sub> tetramer was formed in <i>C.
briggsae</i> instead of a PHY-2/PDI-2 dimer.
Site-directed mutagenesis studies and
generation of inter-species hybrid polypeptides
showed that the N-terminal halves of the
<i>Caenorhabditis</i> PHY-2 polypeptides
determine their assembly properties. Genetic
disruption of <i>C. briggsae phy-1</i> (<i>Cb-dpy-18</i>)
via a <i>Mos1</i> insertion resulted a small (short)
phenotype that is less severe than the dumpy
(short and fat) phenotype of the corresponding
<i>C. elegans</i> mutants (<i>Ce-dpy-18</i>). <i>C. briggsae</i>
<i>phy-2</i> RNA interference produced no visible
phenotype in the wild type nematodes but
produced a severe dumpy phenotype and larval
arrest in <i>phy-1</i> mutants. Genetic
complementation of the <i>C. briggsae</i> and <i>C.
elegans</i> <i>phy-1</i> mutants was achieved by
injection of a wild type <i>phy-1</i> gene from either
species
Space greeter:a low-powered facial recognition device for public spaces
Abstract. Facial recognition is becoming more common all the time with its potentials and with its threats. Itβs getting more accurate and, it has gotten multiple use cases by far, for example in the field of security. As the technology has matured and highly efficient low-cost computers have been developed, it is now possible to implement an affordable real-time facial recognition system. This thesis contains our implementation of a facial recognition software that aims to recognise personβs face and attach it to a name from a database in order to greet them by name. In addition, this thesis contains the evaluation of the implementation and possible future work.
We examine existing programs and libraries in order to determine which would work in our use case. For facial recognition, OpenCV library was deemed the best option for its straightforward implementation and a broad range of functions, basic HTML and PHP based website for user interface and MySQL for storage. Testing system recognition speed and accuracy in real-life deployment was not possible due to covid-19, but a minor test with fewer participants was concluded. Further testing for face recognition performance was done with a FERET-database.
Our tests show that real-time facial recognition with a Raspberry pi 4B as a platform is possible with decent accuracy and speed. In good lighting conditions and with a high confidence level, our algorithm achieved a 2-second delay for face recognition. In theoretical testing using a FERET dataset of 994 persons, our algorithm achieved an accuracy of 93.84\% and a delay of 360-milliseconds when easier images were used. With more difficult and realistic images, the accuracy was 52.80\% and delay 370-milliseconds. Nevertheless, our implementation could be enhanced further, and we discuss the possible means in the summary chapter.Abstract. Kasvojentunnistus yleistyy jatkuvasti samalla luoden uusia mahdollisuuksia, mutta myâs erilaisia uhkia. Kasvojentunnistusohjelmien tarkkuus paranee jatkuvasti ja ympÀrillÀmme on paljon eri kÀyttâkohteita nÀille tarkoille ohjelmille, esimerkiksi turvallisuusalalla. Kasvojentunnistuksen parantuneen tarkkuuden sekÀ edullisten tietokoneiden kehityksen myâtÀ myâs edulliset reaaliaikaiset kasvojentunnistusohjelmat ovat mahdollistuneet. OpinnÀytetyâssÀmme esittelemme oman implementaatiomme kasvojentunnistusjÀrjestelmÀstÀ, joka osaa tervehtiÀ henkilâitÀ heidÀn nimillÀÀn.
Tutkimme tyâtÀmme varten olemassa olevia ohjelmia ja kirjastoja selvittÀÀksemme mitkÀ niistÀ soveltuisivat parhaiten kÀyttâtarkoitukseemme. PÀÀtimme kÀyttÀÀ kasvojentunnistukseen OpenCV-kirjastoa sen helppokÀyttâisyyden ja runsaiden ominaisuuksien vuoksi. KÀyttâliittymÀn toteuttamiseen kÀytimme HTML ja PHP -kieliÀ sekÀ tietokantana toimi MySQL. JÀrjestelmÀn laajamuotoista testaamista julkisella paikalla emme voineet toteuttaa Covid-19 -viruksen vuoksi, mutta suppeampi testaus suoritettiin muutamalla koehenkilâllÀ. LisÀksi kasvojentunnistuksen nopeutta ja tarkkuutta mitattiin kÀyttÀen FERET-tietokantaa.
Testimme osoittavat, ettÀ kasvojentunnistus on mahdollista toteuttaa kohtuullisella tarkkuudella ja nopeudella Raspberry Pi 4B -tietokonetta kÀyttÀen. HyvissÀ valaistusolosuhteissa algoritmimme saavutti kahden sekunnin viiveen kasvojentunnistamiseen. Teoreettisilla testeillÀ kÀytettÀessÀ FERET-tietojoukkoa 994:stÀ ihmisestÀ algoritmimme saavutti 93.84\%:n tarkkuuden 360-millisekunnin viiveellÀ helpommilla kuvilla. Hankalampia kuvia kÀytettÀessÀ tarkkuus oli 52.80\% ja viive 370-millisekuntia. Yhteenvedossa tarkastelemme kuinka implementaatiotamme voisi kehittÀÀ edelleen
Appropriation as a perspective and topic in the study of religion and spirituality
Cultural appropriation is a timely topic that has been taking up a lot of space in public discussions. The concept is often applied in heated debates aimed at calling outβ different actors and actions as appropriation, or on the other hand to defend against such accusations. This thematic issue seeks to look at the topic from a broader and more nuanced perspective, asking what different expressions of appropriation appear in the field of and in relation to religion and spirituality. What discourses and discussions emerge around instances of religious and spiritual appropriation? And how is appropriation understood, negotiated or problematized within, across and around different religious and spiritual groups?
The publication is part of the research project βLearning from Religion and Spiritualityβ (Academy of Finland 2019-2023) [325148]
Silmien liikkeiden simulointi etΓ€lΓ€snΓ€olorobotissa
TiivistelmÀ. Koronaviruspandemian takia etÀtyâskentely on lisÀÀntynyt valtavasti. Opiskelijat katsovat luentoja kotoaan ja tyâkaverit nÀkevÀt toisiaan vain videokuvan vÀlityksellÀ. Kysymykseksi jÀÀ, voiko lÀsnÀoloa parantaa etÀtyâskentelyssÀ ÀÀnen ja videokuvan lisÀksi.
TÀssÀ tyâssÀ esitellÀÀn jÀrjestelmÀ, joka kopioi kÀyttÀjÀn silmien liikettÀ robotin silmien liikkeiksi reaaliajassa. KÀyttÀjÀn kasvoja kuvaamalla saadaan tietoon kÀyttÀjÀn silmien asento tunnistamalla kuvasta kasvot ja sitten rajaamalla silmÀt. Silmien asentojen tieto lÀhetetÀÀn UDP (User Datagram Protocol) tiedonsiirtoprotokollan avulla toiselle tietokoneelle. SiellÀ tieto otetaan vastaan ja lÀhetetÀÀn virtuaalikoneelle, jolla kÀytetÀÀn ROS2 (Robot Operating System 2) kÀyttâjÀrjestelmÀÀ.
ROS2-jÀrjestelmÀssÀ kÀytetÀÀn action client ja data publisher -osaohjelmia. Data publisher lÀhettÀÀ action clientille paikkatietoa, jonka avulla robotin liikkuminen tapahtuu. Action client antaa kÀskyjÀ robotin XL-320 -servoille, jotka liikuttavat robotin silmiÀ samaan asentoon kÀyttÀjÀn kanssa.
JÀrjestelmÀn viivettÀ testattiin pyytÀmÀllÀ kÀyttÀjÀÀ katsomaan puolelta toiselle ja mittaamalla viivettÀ videokuvasta. AikavÀli valittiin kÀyttÀjÀn silmien liikkeiden ja robotin silmien liikkeiden pysÀhtymisen vÀlillÀ. ViivettÀ syntyi tietokoneen laskiessa tunnistusalgorimejÀ ja robotin liikuttaessa servoja. Tuloksena saatu viive on liian pitkÀ luomaan luonnollista etÀlÀsnÀolokokemusta.Simulation of eye movement in a telepresence robot. Abstract. Because of the Coronavirus pandemic, remote working has been increasing significantly. Students watch lectures from home and coworkers see each other only through video. Question remains whether presence can be improved with remote working in addition to voice and video.
In this project a system was developed that copies userβs eye movements to robotβs eye movements in real time. Filming the userβs face will give the userβs eyes position by recognizing their face and then cropping their eyes. The eyes position is sent with UDP (User Datagram Protocol) data transfer protocol to another computer. There information is received and sent to virtual machine, which uses ROS2 (Robot Operating System) operating system.
ROS2 system uses action client and data publisher nodes. Data publisher sends position information to action client which controls the robot. Action client gives commands to robotβs XL-320 servo motors, which move robotβs eyes to same position as the userβs.
Systemβs delay was tested by asking user to look from side to side and measuring the delay from video. Time interval was chosen between the end of userβs eye movement and the end of robots eye movement. Delay was produced with computer calculating recognition algorithms and robot moving the servos. Resulting delay is too long to create natural telepresence experience
Current evidence for a modulation of low back pain by human genetic variants
The manifestation of chronic back pain depends on structural, psychosocial, occupational and genetic influences. Heritability estimates for back pain range from 30% to 45%. Genetic influences are caused by genes affecting intervertebral disc degeneration or the immune response and genes involved in pain perception, signalling and psychological processing. This inter-individual variability which is partly due to genetic differences would require an individualized pain management to prevent the transition from acute to chronic back pain or improve the outcome. The genetic profile may help to define patients at high risk for chronic pain. We summarize genetic factors that (i) impact on intervertebral disc stability, namely Collagen IX, COL9A3, COL11A1, COL11A2, COL1A1, aggrecan (AGAN), cartilage intermediate layer protein, vitamin D receptor, metalloproteinsase-3 (MMP3), MMP9, and thrombospondin-2, (ii) modify inflammation, namely interleukin-1 (IL-1) locus genes and IL-6 and (iii) and pain signalling namely guanine triphosphate (GTP) cyclohydrolase 1, catechol-O-methyltransferase, ΞΌ opioid receptor (OPMR1), melanocortin 1 receptor (MC1R), transient receptor potential channel A1 and fatty acid amide hydrolase and analgesic drug metabolism (cytochrome P450 [CYP]2D6, CYP2C9)
- β¦