23,073 research outputs found

    Foreign Object Detection and Quantification of Fat Content Using A Novel Multiplexing Electric Field Sensor

    Full text link
    There is an ever growing need to ensure the quality of food and assess specific quality parameters in all the links of the food chain, ranging from processing, distribution and retail to preparing food. Various imaging and sensing technologies, including X-ray imaging, ultrasound, and near infrared reflectance spectroscopy have been applied to the problem. Cost and other constraints restrict the application of some of these technologies. In this study we test a novel Multiplexing Electric Field Sensor (MEFS), an approach that allows for a completely non-invasive and non-destructive testing approach. Our experiments demonstrate the reliable detection of certain foreign objects and provide evidence that this sensor technology has the capability of measuring fat content in minced meat. Given the fact that this technology can already be deployed at very low cost, low maintenance and in various different form factors, we conclude that this type of MEFS is an extremely promising technology for addressing specific food quality issues

    Legal, ethical and socio-economic aspects of community telecare

    Get PDF

    Conflicts of Jurisdiction: Antitrust and Industrial Policy

    Get PDF

    Challenging Software Developers:Dialectic as a Foundation for Security Assurance Techniques

    Get PDF
    Development teams are increasingly expected to deliver secure code, but how can they best achieve this? Traditional security practice, which emphasises 'telling developers what to do' using checklists, processes and errors to avoid, has proved difficult to introduce. From analysis of industry interviews with a dozen experts in app development security, we find that secure development requires dialectic: a challenging dialog between the developers and a range of counterparties, continued throughout the development cycle. Analysing a further survey of sixteen industry developer security advocates, we identify the six assurance techniques that are most effective at achieving this dialectic in existing development teams, and conclude that the introduction of these techniques is best driven by the developers themselves. Concentrating on these six assurance techniques, and the dialectical interactions they involve, has the potential to increase the security of development activities and thus improve software security for everyone

    The Cost of Rational Agency

    Get PDF
    The rational agency assumption limits systems to domains of application that have never been observed. Moreover, representing agents as being rational in the sense of maximising utility subject to some well specified constraints renders software systems virtually unscalable. These properties of the rational agency assumption are shown to be unnecessary in representations or analogies of markets. The demonstration starts with an analysis of how the rational agency assumption limits the applicability and scalability of the IBM information filetering economy. An unrestricted specification of the information filtering economy is developed from an analysis of the properties of markets as systems and the implementation of a model based on intelligent agents. This extended information filtering economy modelis used to test the analytical results on the scope for agents to act as intermediaries between human users and information sources

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University
    • …
    corecore