5 resultados para hierarchical structure criteria

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Useiden pitkän kehityskaaren ohjelmistojen ylläpitäminen ja kehittäminen on vaikeaa, sillä niiden dokumentaatio on vajaata tai vanhentunutta. Tässä diplomityössä etsitään ratkaisua tällaisen ohjelmiston ja sen taustalla olevan järjestelmän kuvaukseen. Tavoitteina on tukea nykyisen ohjelmiston ylläpitoa ja uuden työvoiman perehdyttämistä. Tavoitteena on myös pohjustaa uuden korvaavan ohjelmiston suunnittelua kuvaamalla nykyiseen järjestelmään sitoutunutta sovellusalueosaamista. Työssä kehitetään kuvausmenetelmä järjestelmän kuvaamiseen hierarkkisesti laitteistotason yleiskuvauksesta ohjelmiston luokkarakenteeseen sekä toiminnallisuuteen asti. Laite- ja luokkarakennekuvaukset ovat rakenteellisia kuvauksia, joiden tehtävänä on selittää järjestelmän ja sen osien kokoonpano. Toiminnallisuudesta kertovat kuvaukset on toteutettu käyttötapauskuvauksina. Työssä keskityttiin erityisesti kohdejärjestelmän keskeisen ohjelmiston ja tietokannan kuvaamiseen. Ohjelmistosta valittiin tärkeimmät ja eniten sovellusalueen tietotaitoa sisältävät osat, joista työssä luotiin esimerkkikuvaukset. Kuvauksia on kehitettyä menetelmää hyödyntäen helppo laajentaa tarpeiden mukaan paitsi ohjelmiston muihin osiin, myös laitteiston ja järjestelmän kuvaamiseen kokonaisuudessaan syvemmin.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tässä diplomityössä tarkastellaan turvallisuustoiminto-käsitteen määrittelyä ja käyttöä osana ydinvoimalaitosten turvallisuuden varmistamista. Työssä kuvataan paine- ja kiehutusvesilaitosten toiminnan yleispiirteet, sekä Teollisuuden Voima Oy:n (TVO) laitosten Olkiluoto 1 & 2 sekä Olkiluoto 3 tarkempi turvallisuustoiminta turvallisuusjärjestelmien ja -automaation osalta. Työssä esitellään eräs tapa määrittää turvallisuustoimintoja. Malli perustuu hierarkkiseen rakenteeseen, jossa ylimpänä ovat laitostason turvallisuustoiminnot ja alimpana turvallisuustoimintoihin osallistuvien laitteiden ja niiden osien toiminnot. Turvallisuustoimintoja on mahdollista käyttää ydinvoimalaitoksen turvallisuusluokituksen tekemiseen ja perustelemiseen. Turvallisuustoiminto kertoo suoraan luokiteltavan kohteen turvallisuusmerkityksen. Kohteen turvallisuusmerkityksen selvittäminen, eli liittäminen turvallisuustoimintoon, voi olla vaikeaa. Turvallisuustoimintoja on myös mahdollista käyttää laitoksen turvallisuusautomaation riittävän varmistamisen (mm. redundanttisuus, diversiteetti ja erotus) osoittamiseen erityisesti ohjelmoitavan automaation yhteydessä. Turvallisuustoimintoja voidaan hyödyntää laitoksen hätätilanneohjeiden kehittämisessä ja myös laitoksenmuun turvallisuusdokumentaation selkeyttämisessä. Työn tuloksena kehitettiin käyville laitoksille (OL1 & 2) aikaisempaa kattavammat turvallisuustoiminnot. Lisäksi tarkasteltiin rakenteilla olevalle laitokselle (OL3) määriteltyjä turvallisuustoimintoja.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this thesis is to develop an environment or network that enables effective collaborative product structure management among stakeholders in each unit, throughout the entire product lifecycle and product data management. This thesis uses framework models as an approach to the problem. Framework model methods for development of collaborative product structure management are proposed in this study, there are three unique models depicted to support collaborative product structure management: organization model, process model and product model. In the organization model, the formation of product data management system (eDSTAT) key user network is specified. In the process model, development is based on the case company’s product development matrix. In the product model framework, product model management, product knowledge management and design knowledge management are defined as development tools and collaboration is based on web-based product structure management. Collaborative management is executed using all these approaches. A case study from an actual project at the case company is presented as an implementation; this is to verify the models’ applicability. A computer assisted design tool and the web-based product structure manager, have been used as tools of this collaboration with the support of the key user. The current PDM system, eDSTAT, is used as a piloting case for key user role. The result of this development is that the role of key user as a collaboration channel is defined and established. The key user is able to provide one on one support for the elevator projects. Also the management activities are improved through the application of process workflow by following criteria for each project milestone. The development shows effectiveness of product structure management in product lifecycle, improved production process by eliminating barriers (e.g. improvement of two-way communication) during design phase and production phase. The key user role is applicable on a global scale in the company.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Integrins are heterodimeric, signaling transmembrane adhesion receptors that connect the intracellular actin microfilaments to the extracellular matrix composed of collagens and other matrix molecules. Bidirectional signaling is mediated via drastic conformational changes in integrins. These changes also occur in the integrin αI domains, which are responsible for ligand binding by collagen receptor and leukocyte specific integrins. Like intact integrins, soluble αI domains exist in the closed, low affinity form and in the open, high affinity form, and so it is possible to use isolated αI domains to study the factors and mechanisms involved in integrin activation/deactivation. Integrins are found in all mammalian tissues and cells, where they play crucial roles in growth, migration, defense mechanisms and apoptosis. Integrins are involved in many human diseases, such as inflammatory, cardiovascular and metastatic diseases, and so plenty of effort has been invested into developing integrin specific drugs. Humans have 24 different integrins, four of which are collagen receptor (α1β1, α2β1, α10β1, α11β1) and five leukocyte specific integrins (αLβ2, αMβ2, αXβ2, αDβ2, αEβ7). These two integrin groups are quite unselective having both primary and secondary ligands. This work presents the first systematic studies performed on these integrin groups to find out how integrin activation affects ligand binding and selectivity. These kinds of studies are important not only for understanding the partially overlapping functions of integrins, but also for drug development. In general, our results indicated that selectivity in ligand recognition is greatly reduced upon integrin activation. Interestingly, in some cases the ligand binding properties of integrins have been shown to be cell type specific. The reason for this is not known, but our observations suggest that cell types with a higher integrin activation state have lower ligand selectivity, and vice versa. Furthermore, we solved the three-dimensional structure for the activated form of the collagen receptor α1I domain. This structure revealed a novel intermediate conformation not previously seen with any other integrin αI domain. This is the first 3D structure for an activated collagen receptor αI domain without ligand. Based on the differences between the open and closed conformation of the αI domain we set structural criteria for a search for effective collagen receptor drugs. By docking a large number of molecules into the closed conformation of the α2I domain we discovered two polyketides, which best fulfilled the set structural criteria, and by cell adhesion studies we showed them to be specific inhibitors of the collagen receptor integrins.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Phenomena in cyber domain, especially threats to security and privacy, have proven an increasingly heated topic addressed by different writers and scholars at an increasing pace – both nationally and internationally. However little public research has been done on the subject of cyber intelligence. The main research question of the thesis was: To what extent is the applicability of cyber intelligence acquisition methods circumstantial? The study was conducted in sequential a manner, starting with defining the concept of intelligence in cyber domain and identifying its key attributes, followed by identifying the range of intelligence methods in cyber domain, criteria influencing their applicability, and types of operatives utilizing cyber intelligence. The methods and criteria were refined into a hierarchical model. The existing conceptions of cyber intelligence were mapped through an extensive literature study on a wide variety of sources. The established understanding was further developed through 15 semi-structured interviews with experts of different backgrounds, whose wide range of points of view proved to substantially enhance the perspective on the subject. Four of the interviewed experts participated in a relatively extensive survey based on the constructed hierarchical model on cyber intelligence that was formulated in to an AHP hierarchy and executed in the Expert Choice Comparion online application. It was concluded that Intelligence in cyber domain is an endorsing, cross-cutting intelligence discipline that adds value to all aspects of conventional intelligence and furthermore that it bears a substantial amount of characteristic traits – both advantageous and disadvantageous – and furthermore that the applicability of cyber intelligence methods is partly circumstantially limited.