Skip to main content

Home/ Sensorica Knowledge/ Group items tagged safety

Rss Feed Group items tagged

Francois Bergeron

Food Safety | Processor | Food Safety Suppliers | Manitoba Agriculture, Food and Rural ... - 0 views

  •  
    food safety suppliers to government of Manitoba 
Francois Bergeron

food safety test on a chip - 1 views

  •  
    food safety test on a chip
Steve Bosserman

Food Safety in China, and the Risk to the U.S. - 0 views

  •  
    Three years after the melamine-in-milk scandal that made 300,000 children sick, and two years after China passed its first-ever food safety law in response, the country is still struggling to keep its food supply healthy. The Chinese government recently cracked down, closing almost 5,000 food-producing businesses and arresting 2,000 people -- but China experts say a needlessly complex bureaucracy and ferocious determination to turn a profit mean the contamination will keep coming. (On forums where expats chat, Westerners living in China wonder whether there is anything safe to eat.) (Update: Commenters at the China Law Blog, many of them apparently resident in China, reflect the same anxiety.)
Steve Bosserman

Scientist beams up a real Star Trek tricorder | Reuters - 1 views

  •  
    While it may sound like the stuff of science fiction, Jansen isn't the only one to take notice of just how useful a real functioning tricorder would be - especially as a medical tool. Telecommunications giant Qualcomm Inc this year launched the "Tricorder X-Prize Contest" with the slogan "Healthcare in the palm of your hand." Qualcomm hopes to motivate developers with a $10 million prize to make medical tricorders a reality. Wanda Moebus of the Advanced Medical Technology Association, who is not affiliated with Jansen or Qualcomm, told Reuters the X-Prize "is really cool," but cautioned that making a real medical tricorder device "would have to be measured on its safety and effect, like all other medical technologies." Jansen said he has been approached by "a couple of teams" about the X Prize, but added that his prototypes are more for science research than medical tools. Besides, he said he already is on to his next frontier, making a sort of "replicator," another "Star Trek" device that will create 3D objects and foods that are dimensional copies of real items. Jansen's "replicator" is a 3D printer, which in itself is not really new, but the scientist thinks about it in terms reminiscent of "Star Trek's" famous prologue. It's "like nothing we've ever seen before," Jansen said.
Tiberius Brastaviceanu

Sensafety Initiative - 0 views

  •  
    "The citizen science initiative Sensafety intends to uncover the general feeling of safety in a city and to make it accessible to everyone in the spirit of transparency. "
Kurt Laitner

Guidelines on Measuring Subjective Well-being.pdf - 0 views

  • such as interest,engagement and meaning,
  • subjective well-being is taken to be:2Good mental states, including all of the various evaluations, positive and negative, that peoplemake of their lives, and the affective reactions of people to their experiences
  • “subjective well-being is an umbrella term for the different valuationspeople make regarding their lives, the events happening to them, their bodies and minds,and the circumstances in which they live”.
  • ...16 more annotations...
  • In measuring overall human well-being then, subjective well-being should be placedalongside measures of non-subjective outcomes, such as income, health, knowledge andskills, safety, environmental quality and social connections
  • Inparticular, a distinction is commonly made between life evaluations, which involve acognitive evaluation of the respondent’s life as a whole (or aspects of it), and measures ofaffect, which capture the feelings experienced by the respondent at a particular point in time(Diener, 1984; Kahneman et al., 1999
  • eudaimonic aspect ofsubjective well-being, reflecting people’s sense of purpose and engagement
  • The framework used here covers all three concepts of well-being:●Life evaluation.●Affect.●Eudaimonia (psychological “flourishing”)
  • the result of a judgement by the individual rather than thedescription of an emotional state.
  • Elements of subjective well-beingLife evaluation
  • making an evaluation of this sort as involving the individual constructing a “standard” thatthey perceive as appropriate for themselves, and then comparing the circumstances oftheir life to that standard
  • Life evaluations are based on how people remember their experiences (Kahneman et al.,1999) and can differ significantly from how they actually experienced things at the time
  • It is for this reason that life evaluations are sometimes characterised as measures of“decision utility” in contrast to “experienced utility”
  • One of the mostwell documented measures of life evaluation – thePersonal Wellbeing Index– consists of eightquestions, covering satisfactions with eight different aspects of life, which are summedusing equal weights to calculate an overall index (International Wellbeing Group, 2006)
  • (job satisfaction, financial satisfaction, house satisfaction, healthsatisfaction, leisure satisfaction and environmental satisfaction),
  • AffectAffect is the term psychologists use to describe a person’s feelings. Measures of affectcan be thought of as measures of particular feelings or emotional states, and they aretypically measured with reference to a particular point in time.
  • Such measures capturehow people experience life rather than how they remember it (Kahneman and Krueger,2006
  • While an overall evaluation of life can be captured in a single measure, affect has atleast two distinct hedonic dimensions: positive affect and negative affect (Kahneman et al.,1999; Diener et al., 1999
  • positive affect is thought to be largely uni-dimensional
  • negative affect may be more multi-dimensional.
Tiberius Brastaviceanu

g.Sensors - measure physiological and physical signals, connect directly to the amplifi... - 0 views

  •  
    "Limb Movements This piezo-electric sensor is placed on the ankle to detect movements of the feet during sleep. For investigation of restless leg syndrome (RLS) and periodic limb movements (PLM)."
Francois Bergeron

safer industrial robots - robot skin - 0 views

  •  
    Clément Gosselin, prof in robotics and mechatronics shows improvements and the the famous robot skin
Tiberius Brastaviceanu

Proposal - Food SFS-08-2014 - 1 views

  • development of more resource-efficient and sustainable food production and processing
  • competitive and innovative
    • Tiberius Brastaviceanu
       
      We are proposing collaborative ways, here the accent is put on competitive ways 
    • Tiberius Brastaviceanu
       
      We are proposing collaborative methods. Here, the accent is put on COMPETITIVE ways for a "sustainable circular economy"
  • ...29 more annotations...
  • reduction in water and energy use
  • gas emissions and waste generation
  • improving the efficiency
  • ensuring or improving shelf life, food safety and quality
  • competitive eco-innovative processes should be developed
  • sustainable circular economy
  • Intellectual Property (IP)
  • In phase 1, a feasibility study
  • technological/practical as well as economic viability of an innovation idea/concept with considerable novelty to the industry sector
  • to establish a solid high-potential innovation project
  • increase profitability of the enterprise through innovation
  • increase the return in investment in innovation activities
  • The proposal should contain an initial business plan based on the proposed idea/concept.
  • apply to phase 1 with a view to applying to phase 2 at a later date, or directly to phase 2.
  • EUR 50,000. Projects should last around 6 months
    • Tiberius Brastaviceanu
       
      Phase 1 has a classical language. We would need to mask our true identity and beliefs writing this grant proposal. I don't think it's for us... But this is only my opinion. 
  • In phase 2, innovation projects will be supported that address the specific challenge of Sustainable Food Security
  • demonstrate high potential in terms of company competitiveness and growth underpinned by a strategic business plan
    • Tiberius Brastaviceanu
       
      This is more about individual companies and their competitive advantage. Not about networks and not about collaboration and sharing. 
    • Tiberius Brastaviceanu
       
      Moreover, they put emphasis on IP protection and ownership, when we must talk about commons, knowledge commons applied to agriculture, sharing platforms, etc. 
  • Proposals shall be based on an elaborated business plan either developed through phase 1 or another means.
  • Particular attention must be paid to IP protection and ownership
  • Successful beneficiaries will be offered coaching and mentoring support during phase 1 and phase 2.
  • Enhancing profitability
  • competitive solutions
  • global business opportunities
  • sustainable
  • turnover
  • IP management
  • return on investment and profit
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
1 - 10 of 10
Showing 20 items per page