473 resultados para Jarkko Koskinen
Resumo:
Kustannusten pienentäminen hitsauksessa on loputon tie. Pääosa hitsauksen kustannuksista muodostuu hitsaukseen käytetystä ajasta. Tämä diplomityö on tarkoitettu avustamaan yrityksiä mekanisoinnin ja robotisoinnin käyttöönotossa sekä mekanisointilaitteiden ja hitsausrobottien investoinneissa ja niiden kannattavuuden arvioimisessa. Tämä diplomityö on jatkoa alueella aikaisemmin tehdyille selvityksille, joiden perusteella havaittiin Savonlinnan seudun yritysverkoston hitsaavilla pk-konepajoilla olevan kehitystarpeita tuotannossaan ja toiminnassaan. Tässä diplomityössä tarkastellaan ensin teoriatasolla hitsaustuotannon tehostamista eri keinoin, joista tarkemmin tarkastellaan hitsauksen mekanisointia ja robotisointia. Lisäksi selvitetään kolmella yritys-case-esimerkillä hitsausajan vähentämisen vaikutusta kustannuksiin. Samalla esitetään sopivia laitteistoinvestointeja, joilla hitsausajan vähentäminen on mahdollista, sekä tarkastellaan näiden investointien kannattavuutta sekä syntyviä säästöjä.
Resumo:
Because of the heavily overlapping symptoms, pathogen-specific diagnosis and treatment of infectious diseases is difficult based on clinical symptoms alone. Therefore, patients are often treated empirically. More efficient treatment and management of infectious diseases would require rapid point-of-care compatible in vitro diagnostic methods. However, current point-of-care methods are unsatisfactory in performance and in cost structure. The lack of pointof- care methods results in unnecessary use of antibiotics, suboptimal use of virus-specific drugs, and compromised patient care. In this thesis, the applicability of a two-photon excitation fluorometry is evaluated as a tool for rapid detection of infectious diseases. New separation-free immunoassay methodologies were developed and validated for the following application areas: general inflammation markers, pathogen-specific antibodies, pathogen-specific antigens, and antimicrobial susceptibility testing. In addition, dry-reagent methodology and nanoparticulate tracers are introduced in context to the technique. The results show that the new assay technique is a versatile tool for rapid detection of infectious diseases in many different application areas. One particularly attractive area is rapid multianalyte testing of respiratory infections, where the technique was shown to allow simple assay protocols and comparable performance to the state-of-the-art laboratory methods. If implemented in clinical diagnostic use, the new methods could improve diagnostic testing routines, especially in rapid testing of respiratory tract infections.
Resumo:
Context awareness is emerging on mobile devices. Context awareness can be used to improve usability of a mobile device. Context awareness is particularly important on mobile devices due the limitations they have. At first in this work, a literature review on context awareness and mobile environment is made. For aiding context awareness there exist an implementation of a Context Framework for Symbian S60 devices. It provides a possibility for exchanging the contexts inside the device between the client applications of the local Context Framework. The main contribution of this thesis is to design and implement an enhancement to the S60 Context Framework for providing possibility to exchange context over device boundaries. Using the implemented Context Exchange System, the context exchange is neither depending on the type of the context nor the type of the client. In addition, the clients and the contexts can reside on any interconnected device. The usage of the system is independent of the programming language since in addition to using only Symbian C++ function interfaces it can also be utilized using XML scripts. The Meeting Sniffer application, which uses the Context Exchange System, was also developed in this work. Using this application, it is possible to recognize a meeting situation and suggest device profile change to a user.
Resumo:
The basic goal of this study is to extend old and propose new ways to generate knapsack sets suitable for use in public key cryptography. The knapsack problem and its cryptographic use are reviewed in the introductory chapter. Terminology is based on common cryptographic vocabulary. For example, solving the knapsack problem (which is here a subset sum problem) is termed decipherment. Chapter 1 also reviews the most famous knapsack cryptosystem, the Merkle Hellman system. It is based on a superincreasing knapsack and uses modular multiplication as a trapdoor transformation. The insecurity caused by these two properties exemplifies the two general categories of attacks against knapsack systems. These categories provide the motivation for Chapters 2 and 4. Chapter 2 discusses the density of a knapsack and the dangers of having a low density. Chapter 3 interrupts for a while the more abstract treatment by showing examples of small injective knapsacks and extrapolating conjectures on some characteristics of knapsacks of larger size, especially their density and number. The most common trapdoor technique, modular multiplication, is likely to cause insecurity, but as argued in Chapter 4, it is difficult to find any other simple trapdoor techniques. This discussion also provides a basis for the introduction of various categories of non injectivity in Chapter 5. Besides general ideas of non injectivity of knapsack systems, Chapter 5 introduces and evaluates several ways to construct such systems, most notably the "exceptional blocks" in superincreasing knapsacks and the usage of "too small" a modulus in the modular multiplication as a trapdoor technique. The author believes that non injectivity is the most promising direction for development of knapsack cryptosystema. Chapter 6 modifies two well known knapsack schemes, the Merkle Hellman multiplicative trapdoor knapsack and the Graham Shamir knapsack. The main interest is in aspects other than non injectivity, although that is also exploited. In the end of the chapter, constructions proposed by Desmedt et. al. are presented to serve as a comparison for the developments of the subsequent three chapters. Chapter 7 provides a general framework for the iterative construction of injective knapsacks from smaller knapsacks, together with a simple example, the "three elements" system. In Chapters 8 and 9 the general framework is put into practice in two different ways. Modularly injective small knapsacks are used in Chapter 9 to construct a large knapsack, which is called the congruential knapsack. The addends of a subset sum can be found by decrementing the sum iteratively by using each of the small knapsacks and their moduli in turn. The construction is also generalized to the non injective case, which can lead to especially good results in the density, without complicating the deciphering process too much. Chapter 9 presents three related ways to realize the general framework of Chapter 7. The main idea is to join iteratively small knapsacks, each element of which would satisfy the superincreasing condition. As a whole, none of these systems need become superincreasing, though the development of density is not better than that. The new knapsack systems are injective but they can be deciphered with the same searching method as the non injective knapsacks with the "exceptional blocks" in Chapter 5. The final Chapter 10 first reviews the Chor Rivest knapsack system, which has withstood all cryptanalytic attacks. A couple of modifications to the use of this system are presented in order to further increase the security or make the construction easier. The latter goal is attempted by reducing the size of the Chor Rivest knapsack embedded in the modified system. '
Resumo:
More and more companies are interested in implementing knowledge management. However, the majority of knowledge management initiatives will fail to have any significant impact. In this study, theories regarding knowledge management implementation and adoption are investigated further. The objective of this study is to deepen understanding regarding the critical factors that contribute to successful knowledge management adoption in large multinational companies. The study is formulated around the following four research questions: 1. What are the key success and failure factors in knowledge management implementation? 2. How can knowledge management adoption be improved at the individual, group and organizational levels of the company? 3. What are the critical factors that hinder knowledge management adoption in the case company? 4. How can the case company promote the adoption of knowledge management among company personnel? The methodology used in this study is a combination of a literature review and an explanatory, exploratory, qualitative single-case study. The literature review answers the first and second research questions. Based on the literature review, a framework is presented to illustrate the factors contributing to the success of knowledge management implementation. The framework also links together knowledge management implementation and adoption. The third research question is answered by revealing the relevant findings from 21 expert interviews and 2 online questionnaires with 42 respondents in total. By comparing and contrasting the results of the literature review with the findings of the empirical case study, the fourth research question is answered. The concrete outcomes of this study are a framework to elucidate the factors contributing to the success of knowledge management implementation, a case study highlighting the issues that hinder knowledge management adoption within the case company, and recommendations for the case company.
Resumo:
Digitoitu 21. 8. 2008.