Skip to main content

Home/ Sensorica Knowledge/ Group items tagged devices

Rss Feed Group items tagged

Francois Bergeron

A model for device development | Researchers at the Stanford University Program in Biod... - 2 views

  • clinical need.
  • estimated market size and clinical impact associated with each.
  • prior art related
  • ...4 more annotations...
  • barriers to further development exist from an intellectual property perspective
  • Inventors must also determine if they are in a position to efficiently seize the market opportunity.
  • regulatory considerations, reimbursement strategies, intellectual property, and business development objectives. This leads to Phase I of the development model.
  • R&D in Phase II is responsible for generating early concepts. Brainstorming sessions are often held during this stage of development with members of R&D, marketing, and physician consultants. Computational analyses, such as stress and flow studies, are conducted to further understand the behavior of a proposed device. The team often develops a 3D CAD model of a proposed device
  •  
    medical device development steps
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Steve Bosserman

Scientist beams up a real Star Trek tricorder | Reuters - 1 views

  •  
    While it may sound like the stuff of science fiction, Jansen isn't the only one to take notice of just how useful a real functioning tricorder would be - especially as a medical tool. Telecommunications giant Qualcomm Inc this year launched the "Tricorder X-Prize Contest" with the slogan "Healthcare in the palm of your hand." Qualcomm hopes to motivate developers with a $10 million prize to make medical tricorders a reality. Wanda Moebus of the Advanced Medical Technology Association, who is not affiliated with Jansen or Qualcomm, told Reuters the X-Prize "is really cool," but cautioned that making a real medical tricorder device "would have to be measured on its safety and effect, like all other medical technologies." Jansen said he has been approached by "a couple of teams" about the X Prize, but added that his prototypes are more for science research than medical tools. Besides, he said he already is on to his next frontier, making a sort of "replicator," another "Star Trek" device that will create 3D objects and foods that are dimensional copies of real items. Jansen's "replicator" is a 3D printer, which in itself is not really new, but the scientist thinks about it in terms reminiscent of "Star Trek's" famous prologue. It's "like nothing we've ever seen before," Jansen said.
Francois Bergeron

Med Device Development.pdf (Objet application/pdf) - 1 views

  •  
    medical device development time steps
Francois Bergeron

Medical Device Development - 0 views

  •  
    medical device development timeframe and steps
Tiberius Brastaviceanu

BeagleBoard.org - 2014-01-29-project-spotlight-beedome - 0 views

  •  
    "The BeeDome is a computerized system based on the Sitara-processor-powered BeagleBone Black computer as well as a specially designed "cape" plug-in board. BeagleBone Black is connected to the Internet, and stats are uploaded periodically to a website so that the company can closely monitor the nucs. The BeeDome also integrates GE Telaire T6613/T6615 and MG811 sensors to monitor the CO2 level; DS18B20 sensors to monitor temperature; DH22 sensors to monitor humidity and temperature; and Sharp COM-10636 SSR devices to control 120V devices. "Bee" sure to check out ForestDew Apiaries' website for more information on this "unbeelievable" project!"
Tiberius Brastaviceanu

piezo device.JPG - Google Drive - 0 views

  •  
    this is an example of piezo device used by Dilson
Francois Bergeron

Support Little Devices | Little Devices @ MIT - 0 views

  •  
    "We are trying to change the way medical technology reaches the world by making it more agile, user-centered, and democratic. It's a big challenge". selected by Yasir
Tiberius Brastaviceanu

Co-Creating as Disruption to the Dominant Cultural Framework » Wirearchy - 0 views

  • more open people processes
  • Participative processes like Open Space, World Cafes, Unconferences, Peer Circles
  • Barcamps, Wordcamps, Govcamps, Foo Camps, Unconferences, high-end celebrity-and-marketing-and venture-capital ‘experience’ markets, new cultural and artistic festivals with technology-and-culture-making themes
  • ...45 more annotations...
  • maker faires
  • community-and-consensus building, organizing for activism and fundraising
  • The impetus behind this explosion is both technological and sociological
  • Technological
  • information technology and the creation and evolution of the Internet and the Web
  • appearance, development and evolution of social tools, web services, massive storage, and the ongoing development of computer-and-smart-devices development
  • Sociological
  • People are searching for ways to find others with similar interests and motivations so that they can engage in activities that help them learn, find work, grow capabilities and skills, and tackle vexing social and economic problems
  • get informed and take action
  • Developing familiarity and practice with open and collaborative processes
  • play and work together
  • rules about self-management, operate democratically, and produce results grounded in ownership and the responsibilities that have been agreed upon by the ‘community’
  • The relationships and flows of information can be transferred to online spaces and often benefit from wider connectivity.
  • Today, our culture-making activities are well engaged in the early stages of cultural mutation
  • What’s coming along next ?  “Smart” devices and Internet everywhere in our lives ?  Deep(er) changes to the way things are conceived, carried out, managed and used ?  New mental models ?  Or, will we discover real societal limits to what can be done given the current framework of laws, institutions and established practices with which people are familiar and comfortable ?
  • Shorter cycle-based development and release
  • Agile development
  • It is clear evidence that the developmental and learning dynamics generated by continuous or regular feedback loops are becoming the norm in areas of activity in which change and short cycles of product development are constants.
  • The Internet of Things (IoT)
  • clothes, homes, cars, buildings, roads, and a wide range of other objects that have a place in peoples’ daily life activities
  • experiencing major growth, equally in terms of hardware, software and with respect to the way the capabilities are configured and used
  • The IoT concept is being combined with the new-ish concepts of Open Data and Big Data
  • ethical, political and social impact policy decisions
  • that key opportunities associated with widespread uptake of the IoT are derived from the impact upon peoples’ activities and lives
  • ‘we’ are on our way towards more integrated eco-systems of issues, people and technologies
  • participation and inclusion enabled by interconnectedness are quickly becoming the ‘new rules’
  • What the Future May Hold
  • the ‘scenario planning’ approach
  • world’s politics, economics, anthropology, technology, psychology, sociology and philosophy
  • A scenario planning exercise carried out by the Rockefeller Foundation
  • Clearly these early (and now not-so-weak) signals and patterns tell us that the core assumptions and principles that have underpinned organized human activities for most of the past century
  • are being changed by the combinations and permutations of new, powerful, inexpensive and widely accessible information-processing technologies
  • The short description of each scenario reinforces the perception that we are both individually and collectively in transition from a linear, specialized, efficiency-driven paradigm towards a paradigm based on continuous feedback loops and principles of participation, both large and small in scope.
  • cultural ‘mutation’
  • Wirearchy
  • a dynamic two-way flow of power and authority based on knowledge, trust, credibility and a focus on results, enabled by interconnected people and technology.
  • the role of social media and smart mobile devices in the uprisings in Egypt, Libya and elsewhere in the Middle East
  • The roots of organizational development (OD) are in humanistic psychology and sociology action and ethnographic and cybernetic/ socio-technical systems theory.  It’s a domain that emerged essentially as a counter-balance to the mechanistic and machine-metaphor-based core assumptions about the organized activities in our society.
  • Organizational development principles are built upon some basic assumptions about human motivations, engagement and activities.
  • Participative Work Design – The Six Criteria
  • in recent years created models that help clarify how to evaluate and respond to the continuous turbulence and ambiguity generated by participating in interconnected flows of information.
  • contexts characterized by either Simple, Complicated or Chaotic dynamics (from complexity theory fundamentals). Increasingly, Complexity is emerging as a key definer of the issues, problems and opportunities faced by our societies.
  • peer-to-peer movement(s) unfolding around the world
  • Co-creating in a wide range of forms, processes and purpose may become an effective and important antidote to the spreading enclosure of human creative activity.
  • But .. the dominant models of governance, commercial ownership and the use and re-use of that which is co-created by people are going to have to undergo much more deep change in order to disrupt the existing paradigm of proprietary commercial creation and the model of socio-economic power that this paradigm enables and carries today.
Steve Bosserman

Device Sends Message to Swiss Farmer When Cow Is in Heat - NYTimes.com - 2 views

  •  
    Another sensor application for SENSORICA to consider?
Tiberius Brastaviceanu

Piezo mount for needle.JPG - Google Drive - 1 views

  •  
    This is an example of a piezo positioning device used by Dilson
Francois Bergeron

Stretchable electronics to simplify heart surgery? - 0 views

  • Currently this catheter method requires the use of three different devices, which are inserted into the heart in succession: one to map the heart's signals and detect the problem area, a second to control positions of therapeutic actuators and their contact with the epicardium, and a third to burn the tissue away.
  • The device is designed to deliver critical, high quality information - such as temperature, mechanical force, and blood flow - to the surgeon in real time.
Tiberius Brastaviceanu

O-Eland - 1 views

  •  
    We (Tibi, Francois, and Jonathan) had a meeting with them, we are developing a stable relationship. The owner is member of the local network in photonics, so this relation is important from a social capital standpoint. They are kind of slow responding to our demands, probably because they don't yet see a big potential. They can collaborate with us for opto-mechanica assemblies, assemplied of photonics, optical fiber... Mostly for custom design. They buy most of the parts from other places, we can do that too, but they can design and male photonic devices.
Tiberius Brastaviceanu

PeerPoint « Poor Richard's Almanack 2010 - 1 views

  • Each PeerPoint is an autonomous node on a p2p network with no centralized corporate  infrastructure.
  • The PeerPoint will be connected between the user’s pc, home network, or mobile device and the ISP connection.
  • The PeerPoint is designed to Occupy the Internet.
  • ...7 more annotations...
  • provide greater user value
  • For numerous reasons the services provided by the commercial companies do not adequately meet the creative, social, political, and financial needs of the 99%
  • allows self-selected individuals to coalesce into powerful workgroups, forums, and movements.
  • With the PeerPoint approach, each user will own her own inexpensive internet appliance and all the data and content she creates
  • If a FreedomBox were used as a starting platform, the PeerPoint application package would be added on top of the FreedomBox security stack.
  • The common requirements for each PeerPoint app are: world class, best-of-breed open source p2p architecture consistent, granular, user-customizable security management and identity protection integrated with other apps in the suite via a common distributed database and/or “data bus” architecture. consistent, user-customizable large, medium, and small-screen (mobile device) user interfaces ability to interface with its corresponding major-market-share service (Facebook, Twitter, etc.) GPS enabled
  • First tier applications: distributed database social networking  (comparison of distributed social network applications) trust/reputation metrics crowdsourcing: content collaboration & management  (wiki, Google Docs, or better) project management/workflow data visualization (data sets, projects, networks, etc.) user-customizable complementary currency and barter exchange (Community Forge or better) crowd funding (http://www.quora.com/Is-there-an-open-source-crowdfunding-platform) voting (LiquidFeedback or better) universal search across all PeerPoint data/content and world wide web content
Tiberius Brastaviceanu

Matchmaking Device project - SENSORICA - 0 views

  •  
    "matchmaking_device_project"
Tiberius Brastaviceanu

matchmakingdevice - 0 views

  •  
    original matchmaking device system project
1 - 20 of 59 Next › Last »
Showing 20 items per page