16,198 research outputs found

    Safety assessment of the process Loop Polymers, used to recycle polyethylene and polypropylene printed offcuts and scrap for use as food contact materials

    Full text link
    [EN] The EFSA Panel on Food Contact Materials, Enzymes and Processing Aids (CEP) assessed the safety of the recycling process Loop Polymers (EU register number RECYC252). The input consists of polyethylene (PE) and polypropylene (PP) offcuts and scrap from the production of food contact packaging that has not been in contact with food, but carry coatings, ink systems and adhesives. Decontaminated material is intended to be used to produce new articles for their original application. The Panel considered critical the management system put in place to provide full traceability from input to the final product, the material review before processing, as well as the removal of coatings, ink systems and adhesives during recycling. The CEP Panel considered that the applicant did not demonstrate that coatings, ink systems and adhesives were adequately removed during the process. Consequently, it concluded that the applicant has not demonstrated that the recycling process is able to reduce the contamination of the PE or PP recyclate to a concentration that does not pose a risk to human health.Lambré, C.; Barat Baviera, JM.; Bolognesi, C.; Chesson, A.; Cocconcelli, PS.; Crebelli, R.; Gott, DM.... (2022). Safety assessment of the process Loop Polymers, used to recycle polyethylene and polypropylene printed offcuts and scrap for use as food contact materials. EFSA Journal. 20(10):1-8. https://doi.org/10.2903/j.efsa.2022.757718201

    Towards a Smarter organization for a Self-servicing Society

    Full text link
    Traditional social organizations such as those for the management of healthcare are the result of designs that matched well with an operational context considerably different from the one we are experiencing today. The new context reveals all the fragility of our societies. In this paper, a platform is introduced by combining social-oriented communities and complex-event processing concepts: SELFSERV. Its aim is to complement the "old recipes" with smarter forms of social organization based on the self-service paradigm and by exploring culture-specific aspects and technological challenges.Comment: Final version of a paper published in the Proceedings of International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion (DSAI'16), special track on Emergent Technologies for Ambient Assisted Living (ETAAL

    Feasibility study of an Integrated Program for Aerospace-vehicle Design (IPAD) system. Volume 2: Characterization of the IPAD system, phase 1, task 1

    Get PDF
    The aircraft design process is discussed along with the degree of participation of the various engineering disciplines considered in this feasibility study

    Analyzing helicopter evasive maneuver effectiveness against rocket-propelled grenades

    Get PDF
    It has long been acknowledged that military helicopters are vulnerable to ground-launched threats, in particular, the RPG-7 rocket-propelled grenade. Current helicopter threat mitigation strategies rely on a combination of operational tactics and selectively placed armor plating, which can help to mitigate but not entirely remove the threat. However, in recent years, a number of active protection systems designed to protect land-based vehicles from rocket and missile fire have been developed. These systems all use a sensor suite to detect, track, and predict the threat trajectory, which is then employed in the computation of an intercept trajectory for a defensive kill mechanism. Although a complete active protection system in its current form is unsuitable for helicopters, in this paper, it is assumed that the active protection system’s track and threat trajectory prediction subsystem could be used offline as a tool to develop tactics and techniques to counter the threat from rocket-propelled grenade attacks. It is further proposed that such a maneuver can be found by solving a pursuit–evasion differential game. Because the first stage in solving this problem is developing the capability to evaluate the game, nonlinear dynamic and spatial models for a helicopter, RPG-7 round, and gunner, and evasion strategies were developed and integrated into a new simulation engine. Analysis of the results from representative vignettes demonstrates that the simulation yields the value of the engagement pursuit–evasion game. It is also shown that, in the majority of cases, survivability can be significantly improved by performing an appropriate evasive maneuver. Consequently, this simulation may be used as an important tool for both designing and evaluating evasive tactics and is the first step in designing a maneuver-based active protection system, leading to improved rotorcraft survivability

    Big Data Analytics for QoS Prediction Through Probabilistic Model Checking

    Get PDF
    As competitiveness increases, being able to guaranting QoS of delivered services is key for business success. It is thus of paramount importance the ability to continuously monitor the workflow providing a service and to timely recognize breaches in the agreed QoS level. The ideal condition would be the possibility to anticipate, thus predict, a breach and operate to avoid it, or at least to mitigate its effects. In this paper we propose a model checking based approach to predict QoS of a formally described process. The continous model checking is enabled by the usage of a parametrized model of the monitored system, where the actual value of parameters is continuously evaluated and updated by means of big data tools. The paper also describes a prototype implementation of the approach and shows its usage in a case study.Comment: EDCC-2014, BIG4CIP-2014, Big Data Analytics, QoS Prediction, Model Checking, SLA compliance monitorin

    Reactive Rules for Emergency Management

    Get PDF
    The goal of the following survey on Event-Condition-Action (ECA) Rules is to come to a common understanding and intuition on this topic within EMILI. Thus it does not give an academic overview on Event-Condition-Action Rules which would be valuable for computer scientists only. Instead the survey tries to introduce Event-Condition-Action Rules and their use for emergency management based on real-life examples from the use-cases identified in Deliverable 3.1. In this way we hope to address both, computer scientists and security experts, by showing how the Event-Condition-Action Rule technology can help to solve security issues in emergency management. The survey incorporates information from other work packages, particularly from Deliverable D3.1 and its Annexes, D4.1, D2.1 and D6.2 wherever possible

    JEERP: Energy Aware Enterprise Resource Planning

    Get PDF
    Ever increasing energy costs, and saving requirements, especially in enterprise contexts, are pushing the limits of Enterprise Resource Planning to better account energy, with component-level asset granularity. Using an application-oriented approach we discuss the different aspects involved in designing Energy Aware ERPs and we show a prototypical open source implementation based on the Dog Domotic Gateway and the Oratio ER

    Adaptive Energy-aware Scheduling of Dynamic Event Analytics across Edge and Cloud Resources

    Full text link
    The growing deployment of sensors as part of Internet of Things (IoT) is generating thousands of event streams. Complex Event Processing (CEP) queries offer a useful paradigm for rapid decision-making over such data sources. While often centralized in the Cloud, the deployment of capable edge devices on the field motivates the need for cooperative event analytics that span Edge and Cloud computing. Here, we identify a novel problem of query placement on edge and Cloud resources for dynamically arriving and departing analytic dataflows. We define this as an optimization problem to minimize the total makespan for all event analytics, while meeting energy and compute constraints of the resources. We propose 4 adaptive heuristics and 3 rebalancing strategies for such dynamic dataflows, and validate them using detailed simulations for 100 - 1000 edge devices and VMs. The results show that our heuristics offer O(seconds) planning time, give a valid and high quality solution in all cases, and reduce the number of query migrations. Furthermore, rebalance strategies when applied in these heuristics have significantly reduced the makespan by around 20 - 25%.Comment: 11 pages, 7 figure

    A concept for reducing oceanic separation minima through the use of a TCAS-derived CDTI

    Get PDF
    A concept for using a cockpit display of traffic information (CDTI), as derived from a modified version of the Traffic Alert and Collision Avoidance System 2 (TCAS 2), to support reductions in air traffic separation minima for an oceanic track system is presented. The concept, and the TCAS modifications required to support it, are described. The feasibility of the concept is examined from a number of standpoints, including expected benefits, maximum alert rates, and possible transition strategies. Various implementation issues are analyzed. Pilot procedures are suggested for dealing with alert situations. Possible variations of the concept are also examined. Finally, recommendations are presented for other studies and simulation experiments which can be used to further verify the feasibility of the concept

    A Survey on IT-Techniques for a Dynamic Emergency Management in Large Infrastructures

    Get PDF
    This deliverable is a survey on the IT techniques that are relevant to the three use cases of the project EMILI. It describes the state-of-the-art in four complementary IT areas: Data cleansing, supervisory control and data acquisition, wireless sensor networks and complex event processing. Even though the deliverable’s authors have tried to avoid a too technical language and have tried to explain every concept referred to, the deliverable might seem rather technical to readers so far little familiar with the techniques it describes
    corecore